Editorial

Spear phishing – how to be prepared and protected
Editorial Spear phishing – how to be prepared and protected

As a particular type of phishing attack, spear phishing targets from the preliminary phase a certain group, company or organization, with the intent of data stealing. The final goal might be facilitated by an identified or generic weak entry point – and the fraudulent email is tailored to suit this

Safe Harbor Agreement invalidation – what to be prepared for
Editorial Safe Harbor Agreement invalidation – what to be prepared for

The Safe Harbor Agreement is an U.S. – EU agreement between the European Commission and the United States Department of Commerce by virtue of which a Safe Harbor list is open for U.S. organizations. Once businesses meet the conditions and join the list, their European operations are considered

Doxing – Organizational Level
Editorial Doxing – Organizational Level

Doxing (doxxing) – the word – is a neologism that dates back to the 90s, when Usenet’s members posted personal information on fellow users. It basically represents the idea of compiling and releasing digital documents that lead to identity revelation when posted. “Docx” became “dox”. By the late

Software Defined Perimeter -a better, virtual security firewall
Editorial Software Defined Perimeter -a better, virtual security firewall

Software Defined Perimeter (SDP) is a new security approach currently standardized by the #cloud security alliance (#csa). The concept is basically offering an air-gapped network – in a virtual version, so that sensitive data might be secured and companies detaining such data would be better

Ransomware – a trend to stay
Editorial Ransomware – a trend to stay

#ransomware is an actual cyber – phenomenon . First brought to attention in 1989 (the AIDS Trojan or PC Cyborg), then mentioned somewhere back in 2005 ( Trojan.Gpcoder , then the Archiveus Trojan in 2006 that combined ransomware with RSA encryption), 2014 seems to have been its year of choice – the

Editorial Keystroke profiling

Also known as keystroke or typing dynamics , keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to the inherence factors

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later