Cybersecurity fatigue: SAT is dead – long live SAT!

The wider American public was afforded an unwanted glimpse into the Wild West world of ransomware this week, after a cyber-attack crippled Colonial Pipeline, causing fuel shortages across the eastern seaboard and states of emergency to be declared in four states, reports The Guardian. The latest ransomware attack on the US Colonial Pipeline has sparked …

Continue reading Cybersecurity fatigue: SAT is dead – long live SAT!

Online dating and Catphishing: don’t fall a victim

Catphishing stats show that 82% of romance scam victims are women and those over 50 are defrauded out of the most money. Online dating is an undeniable part of finding love in the modern world. By the end of 2020, upwards of 32 million Americans were using online dating services, and the industry is expected …

Continue reading Online dating and Catphishing: don’t fall a victim

Are you phished or pharmed? It is dangerous anyway…

Phished people were exposed to an attack for an average of 17.5 hours before antivirus software discovered it. With pharming, it takes much longer. Phishing and pharming schemes are still one of the grimmest threats to companies and individuals. Even internet giants like Google and Facebook got conned out of hundreds of millions USD via …

Continue reading Are you phished or pharmed? It is dangerous anyway…

Island hopping to your precious data and info resources

The industries most affected by island hopping attacks are finance, healthcare, manufacturing and retail. The term ‘island hopping’ is not originally technological term - it comes from the military strategy. More precisely, the term comes from the World War II, from the strategy the US military used to get to mainland Japan via islands, such …

Continue reading Island hopping to your precious data and info resources

Cloud, Edge and IoT trichotomy: cybersecurity concerns

The cybersecurity issues of the Cloud, Edge and IoT trichotomy are inevitably related to all of these complementary technologies. Cloud Computing is the delivery of on-demand computing services without direct active management by the user. These services range from applications to storage and processing power obtained from the remote data centres and available large number …

Continue reading Cloud, Edge and IoT trichotomy: cybersecurity concerns

Do you think that incoming emails are the most dangerous? You might be wrong…

Email is one of the primary ways we communicate and is an almost universal technology, making it perfect for attackers to reach their victims. Outgoing emails can be even more hazardous than incoming ones. Running and securing business in the cyber environment in these pandemic and economic crisis times can be hard. The rapid progression …

Continue reading Do you think that incoming emails are the most dangerous? You might be wrong…

Antivirus vs Anti-malware simplified but it is also the matter of doctrine…

An endless maze of cybersecurity is, however, not a simple choice between technology tools. Hence, after discussing the above dilemma of interest to common folks, we continue with teasing cybersecurity professionals and policymakers with fitting it in the cybersecurity doctrines. WatchGuard’s Threat Lab has recently published a reporton the latest malware and Internet attacks showing …

Continue reading Antivirus vs Anti-malware simplified but it is also the matter of doctrine…

THREATCASTING as an Emerging Cybersecurity Challenge

Scenario Harriet Downs had it all: a great job, a loving husband, and two beautiful children. She was an up-and-coming programmer at Goldman Sachs for the company’s AI trading bots, on the fast track to management. She, her husband, Steve and the kids had just moved into a beautiful new house in Sevenoaks. Life was …

Continue reading THREATCASTING as an Emerging Cybersecurity Challenge

The greatest cybersecurity threat still stubbornly persists – and is possibly growing!

For one filed cybersecurity professional position on the market in 2020, there will be at least three vacant positions. Often overworked, underappreciated and frequently blamed for a single failure and unacknowledged for successes, cybersecurity professionals tend to become ‘alien gem’. Our reality: almost anybody can become a cybercriminal In mid-May 2020, multiple supercomputers in European …

Continue reading The greatest cybersecurity threat still stubbornly persists – and is possibly growing!