Editorial

Should encryption be limited or encouraged?
Editorial Should encryption be limited or encouraged?

The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions

Smart Home Invaders – just how vulnerable are we?
Editorial Smart Home Invaders – just how vulnerable are we?

A survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or more devices and 5% of households have 11 or more

The EMV card and how to be almost safe
Editorial The EMV card and how to be almost safe

The EMV card comes with enhanced security features, but also with particular vulnerabilities. Since this type of credit cards has been utilized for a while in Europe and in other regions of the globe, the cyber-attackers have already developed various methods of bypassing the security features in

Social engineering in cyber-attacks – how to protect your company
Editorial Social engineering in cyber-attacks – how to protect your company

In our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? Social engineering i

Multi-factor authentication – is your data protected?
Editorial Multi-factor authentication – is your data protected?

It often occurs in the aftermath of a severe data breach that cyber-security analysts talk about the attacked system as not being secured enough, because it did not use multi-factor authentication. Abbreviated MFA, multi-factor authentication is actually 2FA in most of the cases: two-factor

Spear phishing – how to be prepared and protected
Editorial Spear phishing – how to be prepared and protected

As a particular type of phishing attack, spear phishing targets from the preliminary phase a certain group, company or organization, with the intent of data stealing. The final goal might be facilitated by an identified or generic weak entry point – and the fraudulent email is tailored to suit this

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later