Different Approaches to Cybersecurity.

Submitted by Micah Smith on Mon, 10/02/2017 - 10:50

Cybersecurity is becoming an increasingly hot potato on the political scene. Ever since the US elections were supposedly hacked, many government offices went on high alert to conceal valuable assets - like their easy to guess passwords, along with spending habits (hat tipping and alarm bells are at this point all swerving in the direction of the current Tom Price step-down).

China says No to ICO’s

Submitted by Micah Smith on Thu, 09/07/2017 - 09:57

ICO’s (initial coin offerings) are really hot right now, practically sizzling, with people literally raising millions overnight in crypto currency. Last year ICO’s raised a total of $1.6 billion.

Yet a lot of these decentralized and disruptive fundraisers are turning out to be little more than elaborate scams. Some experts are suggesting that up to 75% of all ICO’s are a complete fraud.

Ether, blockchain and Estonia.

Submitted by Micah Smith on Thu, 08/24/2017 - 12:09

With changing times, priorities and requirements change in tandem as well. The internet is quickly becoming the main platform for a majority of industries and most consumers prefer using it for merchandising services. Yet, as we increase the utilization of little devices connected in the web that allows us to perform analysis and make different financial gains like never before, we take substantial risks. Take Ethereum for example, on the tip of everyone’s tongue.
Ethereum is the blockchain platform of Ether, the second most expensive cryptocurrency on the market.

The 'Hater' Hacktivists.

Submitted by Micah Smith on Thu, 08/03/2017 - 09:39

Cyber-attacks have become globally rampant, and the challenges are increasingly difficult to counter. We are past the half way point of 2017 and the damage of security breaches already holds a hefty price, weighing into the billions.

However, around the world there seems to be some nations that are hit harder and more frequently than others.  Hackers repetitively target certain countries either because of political passion or simply because it's easier. Here is our list of countries the Hackers have special sentiment for.

Most hard hit:

Google, you ain't in Kansas anymore!

Submitted by Micah Smith on Wed, 08/02/2017 - 13:16

Online commerce has levelled the playing field for small to large enterprises, giving endless opportunity for businesses to "go global" and gain an international platform for clients.

It's truly opened the market up for everyone in a fair way.

The Dark Net

Submitted by Micah Smith on Thu, 07/20/2017 - 14:30

Running parallel and with almost as much force as the global spread of ecommerce, is the overwhelming success of the Dark Net.

What is the Dark Net?

A darknet is really just any overlay network, accessible through certain encryption patterns or through the use of specific software and can be used, for example in file sharing activities.

Wake up and Smell the GDPR: Prepping for May 25th 2018

Submitted by Micah Smith on Thu, 07/13/2017 - 10:19

If you are doing business within the European Union, either offering goods or services, by this stage you should be well aware that the stop clock is coming to a punctual close for data protection complacency.

The countdown to enforcement of the General Data Protection Regulation (G.D.P.R) has started and if businesses don't comply with upgrades to their data protection services, then the fines will start reigning in from next year.  

Hacking the United Kingdom

Submitted by Micah Smith on Wed, 06/28/2017 - 11:11

Just a few days after the world learned that multiple email passwords of MPS from the UK Parliament were being traded by Russian hackers online, we learned of an attack on the UK Parliament!

Coincidence? Although drawing a link between these two seemingly disconnected events appears a little conspiratorial, the flagrant possibility of a connection clearly exists.

Petya Ransomware attack is happening again

Submitted by James Azar on Tue, 06/27/2017 - 11:08

It wasn’t long ago that people were scrambling to retake control of files encrypted by “wannacry” ransomware, today Europe was taken over by a close relative of “wannacry”. Many major organizations are reported to be victims of this cyberattack.

A few notes about this recent attack:

Mееt the Hacker who just hit puberty, Ahѕаn Tаhіr.

Submitted by Micah Smith on Thu, 06/22/2017 - 10:54

Hacking rерrеѕеntѕ аn іntеrеѕtіng conflict оf interest in thе tесh wоrld: оn the one hand it іѕ thе dreaded buzz word, the bаnе of life posing a mаjоr thrеаt to іmроrtаnt data, security and personal identity, whіlst оn the other іt іѕ used еxtеnѕіvеlу tо mаіntаіn ѕесurіtу аnd роѕіtіоn bу numеrоuѕ fіrmѕ.

Hасkіng іѕ a great аltеrnаtіvе tо cracking аѕ hackers are by and large paid fоr their ѕеrvісеѕ and there is a healthy level of competition and challenge against the сrеаtоrs and developers оf thе рrоgrаm уоu are trying to hack into.