Editorial

The Rise of Ransomware 2.0: New Methods of Extorting Victims
Editorial The Rise of Ransomware 2.0: New Methods of Extorting Victims

Until now, ransomware cyberattacks used to follow a simple pattern: infection, encryption, ransom payment. In recent years, access to such malware has become very easy, the idea of accessing a program as a service being more common, marketed on dedicated forums, both on the dark web and on the

How Israel Became the Land of Cybersecurity Unicorns
Editorial How Israel Became the Land of Cybersecurity Unicorns

Israel had seven cybersecurity unicorns in the first half of 2021, and one in three of the world’s unicorns in the field is Israeli. This is the result of ten years of efforts that started with the drafting of a national strategy that saw government supporting initiative and investment in this

Is Facebook Trying to Analyze Users’ Encrypted Messages?
Editorial Is Facebook Trying to Analyze Users’ Encrypted Messages?

In its many years of being the leading app for fast and simple online chat, WhatsApp has been through a lot, including a privacy policy that has sparked some concern. The Facebook-owned platform boasts end-to-end encrypted messaging that provides users with increased security. However, a recent

The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings
Editorial The Hidden Secrets in IoT Devices: Amazon Echo Does Not Erase Personal Data Even After Resetting to Factory Settings

The smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would be the Amazon Echo smart speaker. A recently published study

Thinking Like a Hacker (Ethically)—the Why and How
Editorial Thinking Like a Hacker (Ethically)—the Why and How

Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright.

Protecting Your Expanding Attack Surface
Editorial Protecting Your Expanding Attack Surface

As much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were and still are also at

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later