1. Y

    Unknown Malware Continues to Rise

    Last year, unknown malware downloads rose over 900% with more than 970 downloads per hour compared to 106 previously. Known and unknown malware, bots and mobile vulnerabilities – find out where your organization is most exposed in the 2016 Check Point Security Report. On an average day, known...
  2. frogboy

    Study finds gamer cyber hygiene stinks

    As online gaming grows in popularity ESET researchers found that cybersecurity measures haven't kept pace as 36 percent gamers reported actively turning off security software if they found it was slowing down their computer. The study, conducted by Google Consumer Surveys, polled 500 gamers and...
  3. SpartacusSystem

    Annual Cybercrime Costs to Double to $6 Trillion by 2021

    Global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021, according to fresh forecasting. Cybersecurity Ventures predicts that in the next five years, costs from damage and destruction of data, stolen money, lost productivity, theft of intellectual...
  4. SpartacusSystem

    4 common habits that endanger your cybersecurity

    Habits are, by definition, hard to change or quit: they become a routine, like the first cigarette in the morning or biting your nails when you are stressed; a routine that nothing can prevent or change – just ask a smoker if heavy rain would stop them going outside for their morning cigarette...
  5. SpartacusSystem

    Cybersecurity Is Broken And The Hacks Are Going To Just Keep Coming

    Click here to continue on reading.
  6. Logethica

    Security Alert Malware found In 75% Of The Top 20 Banks In The U.S.

    Research Finds Malware In 75% Of The Top 20 Banks In The U.S.: SecurityScorecard published its annual report which analyzes the security level of financial institutions and lists their vulnerable areas. The 2016 Financial Cybersecurity Report covers 7,111 global financial institutions. The...
  7. Logethica

    Be Security Conscious When Using Financial Apps

    How to protect your financial apps from getting hacked: There's been no shortage of high-profile hacks over the last few years — think Target, Sony and Ashley Madison — but one sector that hasn't made as much news for breaches is financial. According to the Identify Theft Resource Center, out...
  8. Logethica

    Q&A Antivirus- Dead Or Alive?

    Antivirus- Dead Or Alive? The general notion in the cybersecurity industry is that antivirus is an antiquated product, which does not provide enough security against today’s advanced threats. Symantec CEO even went further and declared the demise of the Anti-Virus. But recent events seem to...
  9. Logethica

    4 Must Read Cyber Security Reports

    Please note that viewing/downloading the reports listed below may require "form filling": 1. Midyear Cybersecurity Report (Cisco) Looking at trends from the first half of 2016, this Cisco report focuses on trends including the growth of ransomware, malvertising and vulnerabilities related to...
  10. Logethica

    Security Alert Hacking the Skills Shortage

    Hacking the Skills Shortage A study of the international shortage in cybersecurity skills - Center for Strategic and International Studies The cybersecurity workforce shortfall remains a critical vulnerability for companies and nations. Introduction Every day we read of another company being...
  11. Logethica

    The chilling truth about cybercriminals — from a paid hacker

    If you think companies and individuals have your data under lock and key, then think again. With hackers becoming more sophisticated and rarely ever getting caught, we'll likely see more and more breaches in the future. That's at least according to Billy Rios, a longtime San Francisco-based...
  12. Logethica

    5 Free Cyber Security Courses That Will Keep You Safe Online

    Keep yourself safe online with these 5 free cyber security courses Does ever the thought of your personal details lying unsafe online cross your mind? Have you ever thought of how to keep your personal data secure online? At some point of time, these questions do cross everyone’s mind at one...
  13. S

    Security Alert Energy Grid Malware Bypasses Cyber and Physical Security

    "Security researchers have discovered new malware designed to bypass traditional physical and cybersecurity which could be used in an attack to shut down an energy grid." Nation State Energy Grid Malware Bypasses Cyber and Physical Security "SentinelOne’s Joseph Landry and Udi Shamir explained...
  14. SpartacusSystem

    What businesses can learn about cybersecurity from season one of Mr. Robot

    Avast takes a look at the hacks from season one of Mr. Robot and explains what businesses can learn from them. Season one of last summer’s hit new TV show, Mr. Robot, was filled with interesting and, for the most part, accurately portrayed hacks. The hacks were carried out by the show’s main...
  15. SpartacusSystem

    What is Social Engineering?

    A good read from the Webroot blog. Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted, the criminals are usually trying to trick you into giving them your...
  16. Andra Zaharia

    JavaScript Malware – a Growing Trend Explained

    JavaScript malware has been building up as a trend for a few years, but in these past 6 months it's surfaced as a trending attack vector. I've seen users on the forum share news about: JavaScript-Based Malware Attacks Your Router's DNS Settings: JavaScript-Based Malware Attacks Your Router's...
  17. frogboy

    Senator calls for national automotive cybersecurity lab

    U.S. Senator Gary Peters (D-Mich.) is pushing to establish a national automotive cybersecurity laboratory and called for the automotive industry to step up their efforts in securing connectedvehicles. “No question, we need a national facility,” Peterstold a cybersecurity forum March 30 at the...
  18. frogboy

    Vision for a new generation of experimental cybersecurity researc

    How do cybersecurity experts discover how to properly defend a system or build a network that's secure? As in other domains of science, this process involves hypothesis, experimentation, and analysis -- or at least it should. In reality, cybersecurity research can happen in an ad hoc fashion...
  19. J

    Cybercrime: rising attacks on online gaming!

    The activity of DDoS attacks has grown by 23% in the last quarter compared to a record level of 1510 attacks, an increase of 180% over the third quarter of 2014. Specifically, the online gaming sector, has been hit particularly hard, with around 50% of all attacks. These are some of the data...