The Cybersecurity Scene.

Submitted by James Azar on Fri, 09/14/2018 - 14:01
The Cybersecurity Scene.
The Cybersecurity Scene.

With the growing sophistication of our virtual assets and increasing dependence on IoT products and cloud computing, comes real developments in the Cyber-security landscape.

This has pushed cyber-security issues and hackers into everyday life for almost every type of individual and business.

The level of sophistication of cyber-crime is reminiscent of the shift from street to organized crime. 


Five Staggering Stats for Cyber Security in 2018

Submitted by CyberHub Summit on Wed, 09/05/2018 - 10:48
Five Staggering Stats for Cyber Security in 2018
Five Staggering Stats for Cyber Security in 2018

There is nothing more impressive (and of course slightly obnoxious) than the guy at the party who knows everything. Well, you don't have to know everything, but keeping a few recent cyber trivia facts at your fingertips is always a conversation starter and evidence that you have your eye on the ball.   Amaze your friends and spout off Cyber Security facts from 2018.


Is it really you?

Submitted by CyberHub Summit on Mon, 08/13/2018 - 13:39
Is it really you?
Is it really you?

Identity theft is spiraling out of control and it's becoming harder and harder to prove who you are on the internet.

Cyber criminals are advancing their techniques and aiming at cyber identity vulnerabilities to cash out by stealing personal data to sell at profit, on the dark net. 


You've Got Mail

Submitted by CyberHub Summit on Fri, 08/10/2018 - 13:07
You've Got Mail
You've Got Mail

Emails are becoming an unavoidable threat to our security.

Both emails and attachments can be highly hazardous to the health of your business.

Why?


What's the Big Deal about SamSam?

Submitted by CyberHub Summit on Fri, 08/10/2018 - 12:15
What's the Big Deal about SamSam?
What's the Big Deal about SamSam?

On the whole, whilst spreading ransomware, the usual malware suspects use old-fashioned strategies that 'hit and hope' with as many victims as possible, such as in mass-pool spam campaigns, sent to thousands, potentially hundreds of thousands of possible targets.


When you fly, no Wi-Fi

Submitted by CyberHub Summit on Fri, 07/20/2018 - 13:00
When you fly, no Wi-Fi
When you fly, no Wi-Fi

Nothing characterizes contemporary employment better than liquidity. The flexibility that cell phones and lap tops have given us to work on- the-go, is tremendous, yet from a security perspective – fraught with challenges.

It is extremely difficult to provide speedy internet and data without compromising security, as end-to-end encryption is loaded with vulnerabilities and this is nowhere more evident than at the airport.


Introduction to the Dark Web

Submitted by CyberHub Summit on Wed, 07/18/2018 - 15:54
Introduction to the Dark Web
Introduction to the Dark Web

The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.


Kids and Smart Phones.

Submitted by CyberHub Summit on Thu, 06/21/2018 - 16:19
Kids and Smart Phones.
Kids and Smart Phones.

Although there is no legal guideline, the consensus is that our children don’t really need smart phones, not until they are at least twelve, possibly fourteen, or at least, that's what Bill Gates was saying in 2017.