Vega Stealer

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:32
Vega Stealer
Vega Stealer

Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.

Recently uncovered by Proofpoint, Vega Stealer is the new sparkly malware found to be targeting the Retail, Manufacturing, Public relations and Advertising sectors.


Clickjacking Attacks

Submitted by CyberHub Summit on Tue, 06/19/2018 - 15:01
Clickjacking Attacks
Clickjacking Attacks

When we discuss the way that cyber criminals access your computer, the following spring to mind: DDos attacks; phishing; Firewall vulnerabilities; SQL injections. One form of attack that doesn't get so much hype but is just as dangerous as any other, is Clickjacking.


Top Five Tips to Secure your Password

Submitted by CyberHub Summit on Mon, 06/18/2018 - 16:52
Top Five Tips to Secure your Password
Top Five Tips to Secure your Password

Twitter has urged all its users to change their passwords due to a malfunction in their 'hashing' system which recently exposed all their users' passwords.

The 'Hashing System' is Twitters encryption process for passwords and provides some level of everyday security for Twitters users, outside of serious vindictive hacking on users' accounts.


Top five ways that you can stay safe online

Submitted by CyberHub Summit on Mon, 06/04/2018 - 10:55
Top five ways that you can stay safe online
Top five ways that you can stay safe online

Apart from choosing secure passwords and being mindful of what and how frequently you download, there are a host of other ways you can be more careful on the net. With your online safety, identity and privacy, becoming major political issues we mustn’t be shy when it comes to beefing up on online safety.

Here are some handy tips you may or may not be aware of:  


A Knock-Out for Centra

Submitted by CyberHub Summit on Thu, 05/31/2018 - 14:15
A Knock-Out for Centra
A Knock-Out for Centra

Crypto is back in the news, and it seems that this time, the ICO market went ten rounds with the SEC and took a serious beating. Along with the heavy uncertainty around the cryptocurrency market and ICO's in general, the Securities and Exchange Commission (SEC) just deemed Centra, the Floyd Mayweather backed ICO, a fraud.


What we can identify from the Atlanta Cyber-attack.

Submitted by CyberHub Summit on Wed, 05/23/2018 - 17:14
What we can identify from the Atlanta Cyber-attack.
What we can identify from the Atlanta Cyber-attack.

Towards the end of March, the City of Atlanta was in the words of the Mayor Keisha Lance Bottoms, 'held hostage'.

The computer network of the City of Atlanta was hit by a ransomware attack which paralyzed a substantial percentage of the city’s data. The hackers demanded $50,000 to unlock the system.


What is 'App-ning to our Privacy?

Submitted by CyberHub Summit on Fri, 05/18/2018 - 22:19
What is 'App-ning to our Privacy?
What is 'App-ning to our Privacy?

So, while you are wondering whether you are one of the 87million who had their Facebook information harvested, it's time to let Zuckerberg's Congressional investigation take care of the corporate side and take stock of our own personal responsibility in protecting our data.


The real cost of a cyber breach at your company…..Do CEOs really know?

Submitted by CyberHub Summit on Mon, 04/30/2018 - 09:33
The real cost of a cyber breach at your company…..Do CEOs really know?
The real cost of a cyber breach at your company…..Do CEOs really know?

By Geoff Hancock

It has been announced ad nauseam over the past few years the impact of a cybersecurity breach to executives and how executives need to take a more active role in managing cyber risk. When you look at the cost of a breach in 2017, you will find a broad set of estimates. According to a Ponemon Institute report, in 2017 it was estimated the cost per breach at $3.6 million (globally), and in the U.S. over $7 million per breach.

Consider the top five most significant expenses that a business has to manage after a breach.