DDoS attacks are still a thing. But they are also easy to mitigate. Here is how, and an interesting discussion about the topic.
With a potential bandwidth of the deep web increasing, it turns more and more into a profitable marketplace. Most recently, employers have sprung up, looking for qualified personnel. Work without the pension scheme’s, 9 to 5, and other inhibiting factors.
Cache currency is a blessing for law-enforcement because it allows them to trace back the origins to a crime. When criminals are forced to resort to crypto currency, the game changes.
The next generation of phishing attacks is there. Brace yourselves, and mitigate!
The #privacy internet is finally becoming faster; a lot!
Bring your own device or BOYD has become a trend in organizations and bring as many benefits. However, certain risks along, too!
Cybercrime comes in many forms industrial espionage is one of them. Today, we are not even safe from paper shredders in the offices anymore.
CEO fraud is one of the most devious forms of cybercrime, and social engineering. The most complex form was experienced, and the risk for future attacks was mitigated.
Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.
This post is about the security risks of having exposed RJ 45 sockets and your organization.
In July 2018, I was invited to provide a briefing to the Special Committee on Terrorism of the European Parliament about the risks of cyber terrorism on critical infrastructure and public spaces.