Hacking often refers to the unauthorized intrusion into a network or computer; normally carried out by one or more “hackers.” However, a hacker can be anyone. They can be an... Read More
The news of catastrophic cyber-attacks in the headlines raises the alarm on the importance of having secure software development. Many websites or apps continue to be vulnerable to malicious attacks... Read More
Forensic investigators depend on the crime scene for a better virtual resurrection of the crime being done. Samples like bullets from weapons, fingerprints from doorknobs, footprints in and around the... Read More
In January 2018, a regional hospital in Indiana was forced to pay $55,000 after their records were infected by the SamSam ransomware. The attackers targeted more than 1400 patients’ data... Read More
You are at the office and you come across a lady trying to open the door but she is not able to reach her identity card as she is carrying... Read More
In June 2018 Reddit admitted they suffered a massive security breach which exposed some of their user’s account information and data, including email addresses and an old 2007 database backup... Read More
Can you spot the hacker? What do you think that means, “hacker?” Were you thinking of a good guy or a bad guy? The term “hacker” tends to be used... Read More
Penetration testing is a vital component of a Threat Management Solution and is now used widely as an effective method of detecting vulnerabilities in an organization’s systems, applications, and infrastructures.... Read More
The rise of security threats is a trend that keeps climbing up the ladder. In 2017, we saw a lot more attacks in comparison to 2016. For example, Yahoo, the... Read More
The dangers of being phished are now widely known, but the extent of the damage is often misunderstood. Successful phishing involves the scammer gaining unauthorized access to an organization’s private... Read More
We are in an age of massive disruptions caused by the technology advancements of organizations going the extra mile to keep up with technology. Many organizations are in possession of... Read More
Most organizations run on a kill-chain methodology, with the sole purpose of manufacturing, releasing, and maintaining effective software. However, with the number of new software vulnerabilities increasing by 141% in... Read More