AI Weaponization

Artificial intelligence technologies are now being leveraged to execute intelligent cyberattacks. Hackers are combining open-source AI technologies with malware to create these AI-based attacks.  This is a trend that is creating new types of advanced and sophisticated threats. AI technologies are used to conceal the malware embedded in applications. Using AI, the malicious behavior of … Read more

Cybersecurity Threats in the Banking Sector

Over the last half a decade, Cyber-attacks has been considered as one of the biggest threat to the financial institution. Cyber criminal’s skill and techniques have evolved with technology; they have become more organized forming groups like Lazurus making it difficult for financial services to have the upper hand in the war on cybercrime.   The … Read more

Cybersecurity Threats on Forex Trading and Cryptocurrencies

Cyber Crime in Forex Trading While cyber-attacks have become a regular occurrence in the world today, catastrophic results have been recorded. The question is, is forex trading impenetrable to hackers? Or is forex trading immune from attackers, how secure is it? In a nutshell, forex trading just as any other online platform is prone to … Read more

Kevin Mitnick – The Most Infamous Hacker of All Time

The art of hacking has been in development for many years. The heyday of hacking was before the Internet even existed. There are amazing and exciting stories about hackers who hacked for notoriety, money, street cred, and just for personal accomplishment. Before the Internet, there were still many targets for hackers. Hackers reverse engineered casino … Read more

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These hotels include Sheraton, Aloft, W Hotels, and Westin Hotels.  Marriott acquired the Starwood Group back in 2016, but the compromise started way back in 2014 before the acquisition took place. Hackers had full access for four years … Read more

Data Limitation Laws?

It is usually not a good idea for lawmakers to get involved in cybersecurity beyond a certain point.  The reason for this is that lawmakers do not have an understanding of the technology that they are legislating. Case in point:  Australia is quickly enacting legislation that will require companies like Apple and Facebook to provide … Read more

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  Usernames and Passwords are controls that rely on “Something you know.”  Knowledge is easily transferable, and therefore, passwords are not secure. No amount of security training will eliminate or overcome human nature.  It is human nature to make passwords we can easily remember.  Passwords … Read more

Hardware Encryption

Why Hardware Encryption is Not Secure

Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still believe this to be true.  And in the past, it was true. But recent history has proven that hardware encryption is highly vulnerable.  The widely … Read more

Murder By Hacking

Murder by Hacking

When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has lead to loss of life in many different ways, including suicide and murder. But hacking has now evolved to the point that cybercriminals can use computers to negatively affect and … Read more

What is Zerodium?

Zerodium is a reputable place where you can sell zero-day exploits. Hackers and security researchers know that Zerodium is a way to cash in on vulnerabilities that they discover in operation systems, software and hardware, and devices. There are several ways that you can make money from discovering vulnerabilities.  You can disclose the vulnerability to … Read more

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed targeting social media accounts.  Specifically, this group focuses on gaining access and control of Instagram and Telegram accounts. Telegram is a popular service with about 40 million users.  Telegram is a communication app that has … Read more

More data shows that Americans are lackadaisical about security.

A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers to comprehend the state of online privacy in 2018. The report reveals a significant knowledge gap and suggests that, despite their fears, US citizens are not protecting themselves against the ever-growing … Read more

North Korean Cryptocurrency Scam Efforts – Marine Chain

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to have especially honed its assault abilities to attack cryptocurrency-related organizations. In the face of mounting and crippling international sanctions, Pyongyang’s many hacker groups have adopted cryptocurrency-focused malicious attempts as an … Read more

City of Westhaven Connecticut Pays $2K in Ransomware Extortion

Another successful ransomware attack…. The City of West Haven, Connecticut made the tough decision to pay hackers $2,000 in ransom money after a ransomware attack halted all their operations. The city contacted the Department of Homeland Security who discovered the attack originated outside of the U.S. West Haven mayor Nancy Rossi said the attack disabled … Read more

Hackers are Unstoppable?

According to research by Kaspersky Lab, 86% of Cybersecurity professionals think that hackers are not stoppable and will eventually succeed at compromising the systems that the cyber pros are hired to protect. In my opinion, this awareness of the seriousness of the threat is admirable.  Such an attitude should keep us all on high alert. … Read more