Is your smart home safe?

Submitted by James Azar on Fri, 09/14/2018 - 15:39
Is your smart home safe?
Is your smart home safe?

The university of Michigan recently found that multiple smart apps and devices have far more access than they really need, to perform necessary functions. This is being termed 'overprivileged' and has caught the fervent eyes of the cyber security community. This is largely because of the gaping hole growing in IOT cyber security.

As the world of IoT expands at an exponential rate, cyber security professionals are concerned that safety is playing second fiddle to consumer desires to stockpile smart goodies.  


The Cybersecurity Scene.

Submitted by James Azar on Fri, 09/14/2018 - 14:01
The Cybersecurity Scene.
The Cybersecurity Scene.

With the growing sophistication of our virtual assets and increasing dependence on IoT products and cloud computing, comes real developments in the Cyber-security landscape.

This has pushed cyber-security issues and hackers into everyday life for almost every type of individual and business.

The level of sophistication of cyber-crime is reminiscent of the shift from street to organized crime. 


Five Staggering Stats for Cyber Security in 2018

Submitted by CyberHub Summit on Wed, 09/05/2018 - 10:48
Five Staggering Stats for Cyber Security in 2018
Five Staggering Stats for Cyber Security in 2018

There is nothing more impressive (and of course slightly obnoxious) than the guy at the party who knows everything. Well, you don't have to know everything, but keeping a few recent cyber trivia facts at your fingertips is always a conversation starter and evidence that you have your eye on the ball.   Amaze your friends and spout off Cyber Security facts from 2018.


Is it really you?

Submitted by CyberHub Summit on Mon, 08/13/2018 - 13:39
Is it really you?
Is it really you?

Identity theft is spiraling out of control and it's becoming harder and harder to prove who you are on the internet.

Cyber criminals are advancing their techniques and aiming at cyber identity vulnerabilities to cash out by stealing personal data to sell at profit, on the dark net. 


You've Got Mail

Submitted by CyberHub Summit on Fri, 08/10/2018 - 13:07
You've Got Mail
You've Got Mail

Emails are becoming an unavoidable threat to our security.

Both emails and attachments can be highly hazardous to the health of your business.

Why?


What's the Big Deal about SamSam?

Submitted by CyberHub Summit on Fri, 08/10/2018 - 12:15
What's the Big Deal about SamSam?
What's the Big Deal about SamSam?

On the whole, whilst spreading ransomware, the usual malware suspects use old-fashioned strategies that 'hit and hope' with as many victims as possible, such as in mass-pool spam campaigns, sent to thousands, potentially hundreds of thousands of possible targets.


When you fly, no Wi-Fi

Submitted by CyberHub Summit on Fri, 07/20/2018 - 13:00
When you fly, no Wi-Fi
When you fly, no Wi-Fi

Nothing characterizes contemporary employment better than liquidity. The flexibility that cell phones and lap tops have given us to work on- the-go, is tremendous, yet from a security perspective – fraught with challenges.

It is extremely difficult to provide speedy internet and data without compromising security, as end-to-end encryption is loaded with vulnerabilities and this is nowhere more evident than at the airport.


Introduction to the Dark Web

Submitted by CyberHub Summit on Wed, 07/18/2018 - 15:54
Introduction to the Dark Web
Introduction to the Dark Web

The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.


The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

Submitted by CyberHub Summit on Thu, 07/05/2018 - 17:40
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.

Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.