Editorial

How to escape the BEC scam – when authority emails equal fraud
Editorial How to escape the BEC scam – when authority emails equal fraud

Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are a particular type of spear phishing, and four organizations

Smartphone fingerprint scanners – are they a trap?
Editorial Smartphone fingerprint scanners – are they a trap?

Fingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It took about

Shadow data threat: how to solve a problem you didn’t know you had
Editorial Shadow data threat: how to solve a problem you didn’t know you had

Shadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data

Steganography – what are you actually seeing/listening to?
Editorial Steganography – what are you actually seeing/listening to?

We come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the era of cybernetics. A sub-section of cryptography,

How to fend off PoS malware in 2016
Editorial How to fend off PoS malware in 2016

One of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed out, the situation is not singular and

Are you convinced you deleted that cloud file?
Editorial Are you convinced you deleted that cloud file?

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later