It's a typical weekday morning. You begin reading emails on your laptop while the coffee brews. One email contains an unexpected business opportunity. The email closes with a request for you to "download the document to view the full proposal." Before you can stop yourself, you click the link ”and immediately a picture like the one above takes over your screen. Nothing can … [Read more...] about What to Do During a Ransomware Attack: How to Assess the Damage and Recover Your Files
attack
Preventing Errors: The Human Factor in Cyber Security
It seems that no matter how advanced cyber security systems get over time, the human factor always remains the greatest liability. When it comes to cyber attacks, most of the time the breach happened due to an employee's misjudgment, carelessness, or simply lack of knowledge. According to a research conducted by BakerHostetler that observed the causes of major security breaches … [Read more...] about Preventing Errors: The Human Factor in Cyber Security
Understanding SDR-Based Attacks on IoT
IoT devices are ubiquitous today. Many of these devices use RF based communication techniques to connect to other devices or to receive commands from remote controls in near field. Many devices like smart tube lights have dual mode operation, in which they connect over the internet for interfacing with a mobile app or via RF with a local remote. RF based communication interface … [Read more...] about Understanding SDR-Based Attacks on IoT
Robotics is Growing, So Are the Security Concerns
Any security professional would recommend that you lock down your home or facility with a video monitoring system. Likewise, they would likely point out that protecting your online network with a firewall is common sense. But what about the other computerized, connected devices that are often overlooked? With technology playing a part in almost everything we do these days, … [Read more...] about Robotics is Growing, So Are the Security Concerns
Top 5 Vulnerabilities In APIs
A vulnerability in the context of software applications is a violation of the defined security policies. Modern web apps are centered on the idea of keeping the workflow logic in the client side and its interaction with the server using APIs (application programming interface). Developers try to make the APIs as stateless as possible, in accordance with the REST principles. … [Read more...] about Top 5 Vulnerabilities In APIs