Cyber News

There are 2.9 Million Open Cyber Security Jobs in the US

Companies are finding it very difficult to hire qualified Cyber Security professionals. Cyber Seek has completed a study that shows that there is a gap of at least 2.9 million cybersecurity jobs.  The most job openings are in Northern Virginia.   Northern Virginia is a hotbed for cyber jobs because of growing areas like Ashburn, VA.  …

There are 2.9 Million Open Cyber Security Jobs in the US Read More »

Top Malware Attacks that Prove IOT Needs Security

You may think you are safe when you put your login credentials to your social media account, but you need to take care of yourself.  Social media and other anything you access online is not safe anymore, do not trust any online platform with your information or data. Always have your doubts every time you …

Top Malware Attacks that Prove IOT Needs Security Read More »

Cyber Risk Management

Overview of Cyber Risk Management Cyber Risk Management, is only defined as the combination of policies, personnel, processes, and technologies that aid organizations to achieve a level of exposure in a manner that is cost effective. Cyber-attacks continue getting large and growing with the growing times. This is costing individuals as well as companies millions …

Cyber Risk Management Read More »

Cybersecurity Threats in the Banking Sector

Over the last half a decade, Cyber-attacks has been considered as one of the biggest threat to the financial institution. Cyber criminal’s skill and techniques have evolved with technology; they have become more organized forming groups like Lazurus making it difficult for financial services to have the upper hand in the war on cybercrime.   The …

Cybersecurity Threats in the Banking Sector Read More »

Internet of Things Cyber Security Threats and Counter Measures

We are currently living in the post-PC era where everyone is connected to the internet through smartphones. No one wants to have a phone which is not accessing internet.  For one to stay a day without accessing social media, would feel like he has missed a lot and has disconnected him or herself from the …

Internet of Things Cyber Security Threats and Counter Measures Read More »

Cybersecurity Threats on Forex Trading and Cryptocurrencies

Cyber Crime in Forex Trading While cyber-attacks have become a regular occurrence in the world today, catastrophic results have been recorded. The question is, is forex trading impenetrable to hackers? Or is forex trading immune from attackers, how secure is it? In a nutshell, forex trading just as any other online platform is prone to …

Cybersecurity Threats on Forex Trading and Cryptocurrencies Read More »

Your home wireless network is likely not very secure

Most of us don’t think about hackers spying on our home internet activity and searching through our home computer files. In fact, most of us believe that our home lives are not interesting enough for hackers to waste their time trying to crack into our systems. But what if it does not take much time …

Your home wireless network is likely not very secure Read More »

Kevin Mitnick – The Most Infamous Hacker of All Time

The art of hacking has been in development for many years. The heyday of hacking was before the Internet even existed. There are amazing and exciting stories about hackers like Kevin Mitnick who hacked for notoriety, money, street cred, and just for personal accomplishment. Before the Internet, there were still many targets for hackers. Hackers …

Kevin Mitnick – The Most Infamous Hacker of All Time Read More »

AWS Cloud Architect Tops the Latest Salary Survey

Amazon Web Services (AWS) is the most significant player in the cloud, holding an astonishing 45% of the industry market share. Given this, there is a huge demand for experts in AWS cloud experts. The latest Salary Survey from CertMag.com proves that AWS professionals can make substantial salaries. The AWS Certified Solutions Architect certification is …

AWS Cloud Architect Tops the Latest Salary Survey Read More »

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These hotels include Sheraton, Aloft, W Hotels, and Westin Hotels.  Marriott acquired the Starwood Group back in 2016, but the compromise started way back in 2014 before the acquisition took place. Hackers had full access for four years …

The Marriott Hack – This is What will Happen Next. Read More »

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  Usernames and Passwords are controls that rely on “Something you know.”  Knowledge is easily transferable, and therefore, passwords are not secure. No amount of security training will eliminate or overcome human nature.  It is human nature to make passwords we can easily remember.  Passwords …

Passwords Suck and Will Go Away – Here’s How Read More »

Are Dark Web Scans Effective?

The Dark Web is Anonymous The dark web is a scary place.  It is a network of websites teeming with illegal activity.  It is a secret place where visitors protect their identity by using techniques to keep identifying information (Like their IP address) hidden. There are several methods that people use to keep themselves anonymous …

Are Dark Web Scans Effective? Read More »

Hardware Encryption

Why Hardware Encryption is Not Secure

Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still believe this to be true.  And in the past, it was true. But recent history has proven that hardware encryption is highly vulnerable.  The widely …

Why Hardware Encryption is Not Secure Read More »

Murder By Hacking

Murder by Hacking

When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has lead to the loss of life in many different ways, including suicide and murder. But hacking has now evolved to the point that cybercriminals can use computers to negatively affect …

Murder by Hacking Read More »

What is Zerodium?

Zerodium is a reputable place where you can sell zero-day exploits. Hackers and security researchers know that Zerodium is a way to cash in on vulnerabilities that they discover in operation systems, software and hardware, and devices. There are several ways that you can make money from discovering vulnerabilities.  You can disclose the vulnerability to …

What is Zerodium? Read More »

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed targeting social media accounts.  Specifically, this group focuses on gaining access and control of Instagram and Telegram accounts. Telegram is a popular service with about 40 million users.  Telegram is a communication app that has …

What is Persian Stalker? Read More »

Avoid data breach Phishing

Phishing attacks up by 300% in 2018

According to “The Retail and eCommerce Threat Landscape Report” from October 2018, there is a 297% increase in the number of phishing websites that target online retail businesses and customers of these businesses.  There is an average of 23 phishing sites for each retail company included in the study.  In 2017 the data showed that …

Phishing attacks up by 300% in 2018 Read More »

North Korean Cryptocurrency Scam Efforts – Marine Chain

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to have especially honed its assault abilities to attack cryptocurrency-related organizations. In the face of mounting and crippling international sanctions, Pyongyang’s many hacker groups have adopted cryptocurrency-focused malicious attempts as an …

North Korean Cryptocurrency Scam Efforts – Marine Chain Read More »

The Bloomberg article about Supermicro Supply Chain Hardware Hack

Everyone is talking about the Bloomberg Businessweek’s volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report is not standing up to the smell test.  As president Trump would say – This is fake news. Apple, Amazon, and the other involved parties delivered strong denials.  If these …

The Bloomberg article about Supermicro Supply Chain Hardware Hack Read More »