One of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed out, the situation is not singular and p
SCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance with
All good passwords have to meet a double condition: hard to guess, yet unforgettable in what their owner is concerned. Even more, how do you achieve that? Obviously, many password users fail at choosing the best virtual key for their accounts. Yet another password secret relies in seeing the
Acting as a cyber-security defense line, user behavior analytics (UBA) consist of monitoring the human behavior patterns that emerge from interacting with an IT system, establishing the normal zone and identifying any anomalies that could signal vulnerabilities or threats. This behavior-focused
Wireless or radio frequency wireless jamming designates the intentional activity of disrupting radio signals in order to disable any transmission that uses radio waves to circulate data or commands to and from RF devices. When used for malicious purposes, this wireless jamming is actually a DDoS
On June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as Google, Facebook, YouTube, Pandora, Netflix, or LinkedIn. The “do not tra
Also known as keystroke or typing dynamics , keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to the inherence factors
IDN homograph attacks belong to the #phishing strategies. Usually the bait emails include a spoofed (homograph) internationalized domain name (IDN). Creating such IDNs is based upon the identical appearance of different logical #characters. Also known as script #spoofing, the hacking technique uses
Cloud computing and cloud storage provide network access to a shared virtual space, in order to use computing resources or to store data. Although seen as a continuation of the 70’s RJE (Remote Job Entry) and of the 80’s VPN (Virtual Private Network), cloud computing in its current sense dates from
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy