Editorial

Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021
Editorial Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021

Hackers have managed to compromise corporate networks three times faster in 2021, with 75% of attacks being financially motivated, a recent report shows. Both government and industry experts say greater complexity and interdependence among systems gives attackers more opportunities for widespread,

The Rise of Ransomware 2.0: New Methods of Extorting Victims
Editorial The Rise of Ransomware 2.0: New Methods of Extorting Victims

Until now, ransomware cyberattacks used to follow a simple pattern: infection, encryption, ransom payment. In recent years, access to such malware has become very easy, the idea of accessing a program as a service being more common, marketed on dedicated forums, both on the dark web and on the

How Israel Became the Land of Cybersecurity Unicorns
Editorial How Israel Became the Land of Cybersecurity Unicorns

Israel had seven cybersecurity unicorns in the first half of 2021, and one in three of the world’s unicorns in the field is Israeli. This is the result of ten years of efforts that started with the drafting of a national strategy that saw government supporting initiative and investment in this

Is Facebook Trying to Analyze Users’ Encrypted Messages?
Editorial Is Facebook Trying to Analyze Users’ Encrypted Messages?

In its many years of being the leading app for fast and simple online chat, WhatsApp has been through a lot, including a privacy policy that has sparked some concern. The Facebook-owned platform boasts end-to-end encrypted messaging that provides users with increased security. However, a recent

The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings
Editorial The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings

The smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would be the Amazon Echo smart speaker. A recently published study

Thinking Like a Hacker (Ethically)—the Why and How
Editorial Thinking Like a Hacker (Ethically)—the Why and How

Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright.

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later