Category: Endpoint Security: Corporate Network Protection

Here is What Businesses Need to Know: Security Trends for 2019

2018 was a year that brought major breaches pretty much every week. So, in May, GDPR came into force as necessary means in protecting companies and their clients. Cyber security is still an important issue that troubles business world. As it seems, businesses will need to invest more resources and energy, if they wish to ...

Designed by Vectorpouch, can be found on https://www.freepik.com/free-vector/cyber-security-technology-illustration-of-private-network-secure-access-and-internet-firewall_2890889.htm

Untold Truth Of 2018 and What to Expect From 2019

There are a few days left for another year to end. During this year, many exploits were found and many governments, small and large companies suffered from cyber-attacks. Let’s remember some of the incidents that caused trouble… As the value of bitcoin increased to 20,000 USD during the first month of 2018, cyber-attacks slightly changed ...

Progression from Stealth to Damage and Disruption

A decade or two ago, hackers were infiltrating the targeted network silently; they were waiting for the perfect moment to act and exit with no evidence left behind them. Thus, their attacks were unnoticeable and even the target companies hardly noticed that they were the victims of a cyber espionage or cyber-attacks. Hackers were lurking ...

Designed by Freepik, can be found on https://www.freepik.com/free-vector/flat-artificial-intelligence-background_1530315.htm

Future Threats Of The Cyber World

Age of Artificial Intelligence is upon us. Artificial Intelligence is started being used and it will be used in broader areas. If you did not notice before, YouTube tracks what you watch and recommends you other videos that you might like. If you like the video that was recommended, you choose to watch and let ...

Designed by Freepik and FreeVector.com, can be found on https://www.freepik.com/free-vector/anonymous-hacker-concept-with-flat-design_2785048.htm and https://www.freevector.com/swiss-army-knife

A New Threat That Will Leave Windows Users Helpless Soon

A new multipurpose attack tool, L0rdix, is currently on sale in Deep Web Forums that are hosted by hackers. L0rdix is written in .NET and designed to infect computers with Windows operating system. It aims to steal and mine while being in stealth mode. Despite being a one-attack-tool, L0rdix is capable of many actions. It ...

Designed by Vectorpocket, can be found on https://www.freepik.com/free-vector/cartoon-illustration-of-bank-robbery-in-safety-vault_3090596.htm

Modern Day Heists: Bank Hackings

On November 6th, Federal Investigation Agency (FIA) Cybercrimes Director Capt. Mohammad Shoaib reported that almost all the banks in Pakistan were hacked and suffered a major security breach. The data breach was revealed when 10 banks blocked all international transactions on debit and credit cards. FIA did high level investigation when 100 cases of security ...

How to Survive in Today’s Cyber World

According to Routine Activities Theory, which is one of the four major victimology theories, the crime occurs when a motivated offender and a suitable target are present while capable guardians are absent. These three elements must converge at the same time and in the same environment. This theory suggests that a motivated offender will act ...

This image was designed by Creativeart, can be found at https://www.freepik.com/free-photo/doctor-reviewing-a-tablet_926688.htm

Cyber Threats That are Lurking in Hospital Environment

Healthcare technologies are saving and enhancing patients’ lives with wearable devices that can monitor patients’ health and apply medication according to values of the patient, such as insulin pumps, pacemakers and so on. Also, it provides storage for Electronic Health Records, which is used to see patients’ history very quickly and evaluate patients’ condition effectively ...

Designed by Freepik hrehttps://www.freepik.com/free-vector/human-skull-drawing_756290.htm https://www.freevector.com/pray-for-japan#

TRITON: The Malware That Could Have Killed Hundreds

In December 2017, a Middle Eastern oil and gas petrochemical plant was attacked by malware named TRITON, also known as TRISIS or HatMan. It targeted the plant’s Safety Instrumented System that is a part of Industrial Control Systems. ICS vs SIS Industrial Control Systems (ICS) are computer-based devices that are used by engineers to monitor ...