What's the Big Deal about SamSam?

Submitted by CyberHub Summit on Fri, 08/10/2018 - 12:15
What's the Big Deal about SamSam?
What's the Big Deal about SamSam?

On the whole, whilst spreading ransomware, the usual malware suspects use old-fashioned strategies that 'hit and hope' with as many victims as possible, such as in mass-pool spam campaigns, sent to thousands, potentially hundreds of thousands of possible targets.


When you fly, no Wi-Fi

Submitted by CyberHub Summit on Fri, 07/20/2018 - 13:00
When you fly, no Wi-Fi
When you fly, no Wi-Fi

Nothing characterizes contemporary employment better than liquidity. The flexibility that cell phones and lap tops have given us to work on- the-go, is tremendous, yet from a security perspective – fraught with challenges.

It is extremely difficult to provide speedy internet and data without compromising security, as end-to-end encryption is loaded with vulnerabilities and this is nowhere more evident than at the airport.


Introduction to the Dark Web

Submitted by CyberHub Summit on Wed, 07/18/2018 - 15:54
Introduction to the Dark Web
Introduction to the Dark Web

The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.


The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

Submitted by CyberHub Summit on Thu, 07/05/2018 - 17:40
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.
The First Step in Solving the Encryption Crisis – Upgrades to Homomorphic encryption.

A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.

Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.


Cyber Crime 2018

Submitted by CyberHub Summit on Thu, 06/21/2018 - 12:50
Cyber Crime 2018
Cyber Crime 2018

As we draw closer to the halfway point of 2018, a clear and alarming picture of cybercrime and its' true annual cost is emerging. With spending exponentially rising on both prevention and damage, the wake-up call that came from the IBM Chairman, Rometty back in 2015, that 'cyber-crime was the greatest threat to every company in the world' is simply becoming more of a reality, year by year.


Vega Stealer

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:32
Vega Stealer
Vega Stealer

Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.

Recently uncovered by Proofpoint, Vega Stealer is the new sparkly malware found to be targeting the Retail, Manufacturing, Public relations and Advertising sectors.


Clickjacking Attacks

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:01
Clickjacking Attacks
Clickjacking Attacks

When we discuss the way that cyber criminals access your computer, the following spring to mind: DDos attacks; phishing; Firewall vulnerabilities; SQL injections. One form of attack that doesn't get so much hype but is just as dangerous as any other, is Clickjacking.