The Overall Financial Impact of a Cyber Attack

The Overall Financial Impact of a Cyber Attack

Cyber criminals pursuing financial gain through identity theft, fraud and blackmail; competitors disrupting businesses or stealing intellectual property to gain advantage; and “hacktivists” penetrating firewalls to make political statements, cyber crime has never been as rampant as it is today. This has made it very critical for organizations especially those running business-critical operations over the […]

North Korea possibly behind global cyberattack, researchers say

North Korea possibly behind global cyberattack, researchers say

Cyber security researchers said Monday they may be able to link North Korea to the unprecedented global cyberattack that took more than 300,000 computers hostage in 150 countries last week. Symantec and Kaspersky Lab said that some of the code used in the version of the WannaCry software had also been used in programs run by […]

Patient Safely, Validated State, and Cyber Security! OH MY!

Patient Safely, Validated State, and Cyber Security! OH MY!

There are some interesting influences on medical devices related to cyber security (yeah, I know, cyber. Common parlance is common parlance.) that you may or may not be aware of. I am not saying that medical devices are special snowflakes and nobody else knows our pain, but there are some things that are worth mentioning […]

Portable Penetration Testing Distribution for Windows: PentestBox – vulnerablelife

Portable Penetration Testing Distribution for Windows: PentestBox – vulnerablelife

    PentestBox is not like other Penetration Testing Distributions which runs on virtual machines. It is created because more than 70% of penetration testing distributions users uses windows and provides an efficient platform for Penetration Testing on windows. It provides all security tools as a software package, eliminating requirement of Virtual machines or dualboot environments […]

Growing cyber crimes need attention

Growing cyber crimes need attention

Mon Mar 05, 2018 Hyderabad, India Growing cyber crimes need attention THE HANS INDIA |   Mar 04,2018 , 10:14 PM IST Growing cyber crimes need attention The workshop on “Cyber Crimes Against Women” majorly focused on various kinds of cyber-crime and cyber trafficking and its remedies to avoid becoming a victim. Tripurana Venkataratnam, Chairperson, […]

Cyber attack spreads across 74 countries; some UK hospitals crippled

Cyber attack spreads across 74 countries; some UK hospitals crippled

Cyber attacks that hit 74 countries across Europe and Asia Friday, impacting the public health system in Britain, apparently involved a leaked hacking tool from the National Security Agency. The attack used ransomware, which is malware that encrypts data and locks a user from their data until they pay a ransom. The tool, which was […]

Cyber security: Your Next Breach – Not If, But When?

Cyber security: Your Next Breach – Not If, But When?

Gone are the days when businesses can assume that “Cyber attacks won’t happen to us”. From the recently launched “Ransomware Wanna Cry attack”, it has been made crystal clear that cyber attacks are inevitable and can affect not just the banks and credit card companies but any business that has products, services and customers. Today, […]

Majority of businesses lack cyber security expertise

Majority of businesses lack cyber security expertise

The majority of businesses do not possess adequate cyber security expertise to prevent attacks and protect their customers, a report has found. Specialist insurer Hiscox surveyed 4,000 firms in the UK, US, Germany, Spain and the Netherlands, and found 73 per cent were severely lacking in digital security. Around half (45 per cent) of business surveyed […]

Cyber Security And Protecting Your Marketplace: A Guide

Cyber Security And Protecting Your Marketplace: A Guide

The ISBuzz Post: This Post Cyber Security And Protecting Your Marketplace: A Guide appeared first on Information Security Buzz. What is Cyber Security? Cyber security is a protection protocol made to protect physical and virtual systems from theft. Protecting your files requires a coordinated efforts through an information system. Here are some common elements about […]