Browsing tag

threats

Protecting Your Network & PC From The Impending Threat of Ransomware

Digital extortion continues to pose a threat everywhere. According to the Cyber Advisor newsletter, incidents of ransomware attacks are only going to skyrocket and increase manyfold.  The level of threat has only escalated with military-grade hacking techniques used to target entire geographies, large scale corporations, hospitals, schools and just about anyone with an internet connection […]

2019 Israeli Security Expo Promises to Deliver Solutions to New-Age Threats

The 2019 International HLS & Cyber Expo is all set to be the largest cybersecurity conference and exhibition in Israel. Attracting global leaders from law enforcement, special forces, defense, and cybersecurity communities, this massive expo is sure to introduce more than a few new-age solutions to modern threats. Due to its geographical proximity to many […]

Huawei a Threat to Australia’s Infrastructure, Says Spy Chief

Australia’s spy chief says that China’s Huawei could pose a great security threat to the country’s infrastructure, especially the water supply and electricity grid. The Guardian reports, “Australia’s spy chief has explained why China’s Huawei or ZTE could not be allowed to help build Australia’s new 5G mobile network, saying a potential threat anywhere in […]

Indian Corporates Should be Wary of Email-Based Threats

The focus today is on the Indian corporate scenario. The HackerCombat research team, ever on the go, has been analyzing the current cybersecurity landscape in India, with special focus on the world of corporates and corporate users. We have been assessing and studying all the trends as regards cybersecurity; we had met and interviewed independent […]

NTT and Symantec Partnership Bears First Fruit: WSaaS

NTT Security declared that it will incorporate Symantec’s cloud-based security benefit with its own improved threat detection, giving Web Security as a Service (WSaaS). The service will focus on providing customers with management and monitoring capabilities for their cloud-based and on-premise security products, as well as providing threat analysis and protection in its own right. […]

Australia Doesn’t Want Huawei And Zte For Their 5G Networks

The Australian government doesn’t want the Chinese companies Huawei and ZTE to supply technology for its 5G network. The government has decided to block these two prominent Chinese tech companies from providing technology to support its 5G network, which is slated for a commercial launch next year. In a Tweet dated August 22, Huawei has […]

Facebook Bigwig Says It’s Time To “Pick Sides” In The Moral Debate

Alex Stamos, Facebook’s outgoing Chief Security Officer, recently sent a departing note to his colleagues asking them to take responsibility for the platform’s failings and step up in situations of moral debate, especially around humanitarian issues. For a long time, the social media giant has chosen to skirt these problems in the hopes of keeping […]

Cybersecurity Summit Cyber:Secured Forum to be Held in June

A cybersecurity summit designed to connect leaders in cybersecurity trends, physical security, systems integration industries etc is set to launch this year in June… The summit, named Cyber:Secured Forum, will be launched in Denver, Colorado and will be held from June 4 to 6. The summit has come into existence through a partnership of the […]

Five – Point Cyber Security Manual for Companies

Businesses today are obliged to protect tonnes of information- corporate business data as well as sensitive personal data of customers. We’ve seen companies, big as well as small ones, crumbling to dust as a consequence of data breaches, most of which could have been avoided, had they taken adequate cyber security measures. A sound cyber […]

5 Essentials Your Cybersecurity Strategy Should Include

Cybersecurity Strategy refers to the security plans enterprises adopt in order to safeguard their businesses against various evolving cybersecurity threats. These security plans are the result of a lot of brainstorming usually conducted between the board of directors of the respective enterprises and cybersecurity professionals, the output of which are – to put it very […]

Cyber Security Threat Hunters? Who Are They? What Do They Do?

The internet has brought with it a lot of benefits for us. Unfortunately, it has also introduced us to cyber crimes. Since the advent of this nefarious activity, the world has been battling hard against it, only to be defeated most of the time. Through experience, we’ve built various security tools, employed various security experts, […]