Cybersecurity- Insiders

How to elevate your mobile security?

Smart Phones are turning into life blood to our humans. And that’s due to the fact that they are not just being used to...
Cybersecurity- Insiders

Teenage student arrested for launching Westmoreland Cyber attacks

A teenage student was arrested on Wednesday this week for launching a series of cyber attacks on more than a dozen local school districts....
Cybersecurity- Insiders

Cybersecurity 2017 – The Year In Preview: Trade Secret Theft Takes Center Stage

Check to state you have read and agree to our Terms and Conditions Terms & Conditions and Privacy Statement Mondaq.com (the Website) is owned and managed by...
Cybersecurity- Insiders

IoT: Usability Dream or Privacy Nightmare?

Javvad Malik wrote an interesting post about IoT: Usability Dream or Privacy Nightmare? that I would like to share. "Probably the best £100 I’ve ever spent...

Threats Driving You Nuts? Try Threat Hunting With Sqrrl

This article originally appeared on the IBM Security Intelligence blog. Squirrels have many predators and enemies (hawks, snakes and, of course, cars), but Sqrrl shows how the hunted can become...
Cybersecurity- Insiders

Liberia is still under the influence of Cyber Attack

Liberia is still reigning under the influence of cyber attack which hit it badly last week and dislodged its network communication with outside world....
Cybersecurity- Insiders

Australia has declared a war against ISIS in cyberspace

Australia has made it official that it has launched a warfare against Islamic State Group in cyberspace. However, this announcement has increased the cyber...
Cybersecurity- Insiders

Casinos and hotels in Las Vegas become soft targets for cybercriminals

Casinos and hotels located in Las Vegas are now acting as soft targets to cybercriminals. And this was revealed in a research conducted by...
Cybersecurity- Insiders

SO WHAT’S NEW WITH THE NEW UK CYBERSECURITY STRATEGY?

Adrian Davis wrote an interesting post about SO WHAT’S NEW WITH THE NEW UK CYBERSECURITY STRATEGY? that I would like to share. "The intent to enforce…...
Cybersecurity- Insiders

Malware hacks and turns headphones into microphones

Through a recently created malware, researchers were able to repurpose earphones with no in-line mic into microphones that can record audio. Image INQUIRER.net It’s understandable...