cyber security

CYBER SECURITY AWARENESS MONTH

This post was originally published here by  (ISC)² Management . October is Cyber Security Awareness Month, as well as National Bullying Prevention Month, which means it’s the perfect time to get up-to-date on the activities of the Center for Cyber Safety and Education! Their third lesson of the Garfield’s Cyber Safety Adventuresin the Safe and Secure Online […]

Downloadable Internet videos and images can now be protected from Cyber Attacks

Researchers from the Ben Gurion University of the Negev have developed a new technique which helps keep users downloading internet videos and images safe from cyber attacks. As downloadable and streaming video or pictures, related content is being used as launch vehicles for cyber attacks, the content has turned into a paradise for hackers and […]

New Law in New York State Could Shape Cyber Security Across the US

This post was originally published here by Bob Covello . The New York State Department of Financial Services has adopted a new cyber security regulation for all banking, insurance, and financial institutions that conduct business in New York State. The new law is in effect as of 01 March, 2017. Firms that have more than 10 […]

How Cyber Resilient Are The Top Online Banks?

This post was originally published here. Booksellers and electronics retailers aren’t the only brick-and-mortar businesses challenged by the rise of highly agile, online-only competitors—traditional retail banking institutions also face stiff competition from Internet-based consumer banking upstarts. But are these born-in-the-cloud banks and financial services offerings safer than their traditional counterparts? Let’s take a look at the […]

“NO NEED FOR FURTHER CYBER SECURITY REGULATION AT THIS TIME”

This post was originally published here by  (ISC)² Management. Yes, you did read the headline right. It is the conclusion of a United Kingdom’s Government review (Cyber security regulation and incentives review) published right at the end of 2016. Here, the UK Government concludes that the EU General Data Protection Regulation (GDPR), with its reporting requirements […]

US firms are better than their UK counterparts when it comes to Cyber Security

CFC,  a leading global underwriting firm providing insurance related to cyber security has revealed in its latest report that UK firms are having a lower level of maturity than their US counterparts when it comes to cyber security. The claim was made by the underwriting firm based on the analyzed figures which revealed UK organizations […]

Know how blockchain can act as a panacea to all cyber attack troubles

In this digital world, nothing seems to be immune to cyber attacks and cyber crooks. But if the technology of blockchain can be carefully explored and emphasized, it can help a public or private agency to build a network which has no single point of failure and is super resilient to cyber attacks. Bitcoin, a […]

Positive Password Psychology

There was an interesting study conducted some years ago. In that study, young participants were asked a series of questions. The ostensible purpose of the study was to find out the answers to the questions. As with most of those cheeky study authors, the real purpose was to measure the effect of “behavioral priming”. The […]

Australia has declared a war against ISIS in cyberspace

Australia has made it official that it has launched a warfare against Islamic State Group in cyberspace. However, this announcement has increased the cyber vulnerability of businesses and government organizations operating in Australia, as ISIS has also declared a counter attack. Speaking to the Parliment, Australian Prime Minister said that the nation is now waging […]

Mobile antivirus software is being blocked by Android malware

Cybersecurity concerns are increasing day by day and the latest to add to this anxiety is an Android banking Trojan. As per a recent alert issued by Kaspersky the said malware named “Banker.GT” has the ability to block Mobile Antivirus apps from launching on the phone. Thus, it helps cyber criminals to steal login credentials […]

Share this page