Botnets as cybercriminals’ viable option in the emerging economic crisis

Most botnets are currently deployed for the distributed denial-of-service (DDoS) attacks but can also be used for delivering spyware, email spam, phishing, ‘click fraud’, stilling confidential information or the bitcoin mining. Looming economic crisis The world has changed dramatically in the three months since our last update of the World Economic Outlook in January, warns […]

Data_breach_No_business_sorry

Data breach? Not doing business with you, sorry…

Almost one in four Americans stop doing business with companies who have been hacked, and more than two in three people trust a company less after a data breach, reported ZD Net. The data breach trend Today’s economy thrives on disruption. Unless you maintain quality services and keep up with technology, you are likely to […]

Computing on the Edge: How secure it is?

The Business Insider recently announced that there are about 10 billion connected IoT devices in 2018 and predicted that there will be 64 billion of these devices in use by 2026. The vast majority of these devices are or will be connected to the edge computing networks. But how secure it is?   Computing on […]

Third-party risk

Cybersecurity quandary: Is the third party betraying us?

The survey concludes that although nearly 80% of respondents believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years. Few organizations are, however, prepared to mitigate the risks. Is, then, a third party betraying us or we are just inattentive? This issue must, anyway, […]

5G security: Is the cheese already moved?

With 5G just around the corner, it seems that people are struggling to understand all its facets – including cybersecurity. The 5G brings far-reaching changes, significantly different from previous generations of mobile communication networks as it will cause major modifications in technology and network architecture. This architecture will connect an enormous volume of the internet […]

Security of the 4th Industrial Revolution

Weak cybersecurity can make benefits of the 4IR null and void

Raising cybersecurity awareness designates a necessary step in successfully addressing cybersecurity issues of the 4th Industrial Revolution and forming ‘cyber intelligent’ leadership, workforce and citizenry. The backdrop Almost all organisations in the future will be digital, and 60% of all global GDP will come from digital sources by 2022, according to the World Economic Forum […]

Your Carmaker is Hacking You!

Although some people think that hacking modern cars rather belong to Hollywood scenarios, we advise you to take preliminary measures and prevent bellicose surprises.   MERCEDES has recently sparked a privacy row by admitting it spies on drivers with tracking devices covertly installed in its cars. The secret sensors, fitted to all new and used […]

Dear Board Members, we are under attack!

The NASDAQ report revealed that more than 90% of corporate board members and executives said that they cannot read a cybersecurity report and are not prepared to handle a major cyber-attack. The scenery The most recent report has astonished wider public with the statement that, in one of the biggest data breaches ever, a hacker […]