The World of Internet Crimes

world of internet crimes

Most among us have been fighting with Internet crimes for more than twenty years. The daily hot sheet of malware used to be called the “Dirty Dozen”, because only a dozen of malware programs could found listed there. But today, there literally are hundreds of malware programs written, a growing number of hacking organizations with …

Read moreThe World of Internet Crimes

An Overview of the UK, US and EU Cyber Security Status

UK-US-EU Cyber security

How are we, or our governments prepared for Cyber Security?  Are there any commonalities? What does the future hold? In undertaking this task, I’ve limited it to the United Kingdom, United States and  European Union.  I’m in no doubt that other countries are progressing with their own measures in the cyber arena, thus all are …

Read moreAn Overview of the UK, US and EU Cyber Security Status

Importance of Proper Cyber Security Training Backed with Reports

Cyber Security Report

Cyber Security, its training and shortage of cyber security professionals has resulted in the following reports: Global shortage of two million cyber security professionals by 2017 Study finds 90 percent have no recent cybersecurity training PWC Cyber Security skill shortage These are alarming reports, reflect that the cyber criminal gets stronger, no longer the impoverished …

Read moreImportance of Proper Cyber Security Training Backed with Reports

Cyber Security, a Pragmatist View

Cyber Security unique view

Threat actors are maturing, they’re growing up, if not already. However, their tactics are such, they have ‘no code of conduct’, no ‘gentlemanly behavior’. Should this rationale be the driver in combating ‘Cyber crime‘ then, ‘fight fire with fire’! As governments of the US and UK have their security doctrines, as equally those of Russia, …

Read moreCyber Security, a Pragmatist View

The Internet of Dangerous Things and Top Worst Information Systems’ Cyber Security Threats Today

The Internet of Dangerous Things

Our era embraces the Internet of Things, meaning that there is a plethora of different things connected to the web. Although this type of progress has led to the facilitation of a great many aspects of our daily routine, this does not come without a price. On the contrary, there are several threats that have …

Read moreThe Internet of Dangerous Things and Top Worst Information Systems’ Cyber Security Threats Today

Security Loopholes in Banking Institutions not Patched, Hackers Still in

banking cyber security loopholes

According to an article from Financial Times, a security company named Bronzeye has identified risks in the banking field and has addressed these risks to the FCA (which stands for the Financial Conduct Authority). Although they were properly informed of the severity of such risks, it appears that the FCA did nothing to raise awareness …

Read moreSecurity Loopholes in Banking Institutions not Patched, Hackers Still in

Is Technological Growth Creating More Security Loopholes?

Is Technological Growth Creating More Security Loopholes

Most security experts confirm that technology is increasing at such a fast and crazy pace, but security solution isn’t keeping up with it. Over the years, technology has evolved at an exponential rate, from laptops to tablets, wearable devices, drones, IoT/IoE (Internet of Things/Internet of Everything), RFID & NFC based systems, connected cars and smart …

Read moreIs Technological Growth Creating More Security Loopholes?

Chinese New Year and Future Predictions on Cybersecurity

cybersecurity predictions china 2015

We have now entered the Year of the Goat or the Sheep in China and this is the beginning of a new, even stricter era for the Chinese Government. According to predictions, the future will hold even tighter restrictions and the new situation formed for the citizens concerning their cyberspace will become even more evident …

Read moreChinese New Year and Future Predictions on Cybersecurity

NSA’s undeletable malware is not in the hands of government only

Malware That Cannot Be Deleted by NSA

With the recent revelations about malware that cannot be deleted even after upgrades and formats linking itself to the NSA and with the ongoing successes of hackers and other tech experts to penetrate spying devices, a digital war focusing on data and surveillance has been launched! Some days ago, the waters of cyber security were …

Read moreNSA’s undeletable malware is not in the hands of government only

Internet Freedom enemies, who they are in fact? China, Russia, US, or others?

True Enemy of Internet Freedom

The internet is an important medium for sharing information, expressing opinion and imparting new ideologies. The speed at which this human knowledge is shared over the internet is not only fascinating but also has a long lasting impact on modern society. As a result, the internet has evolved to be the most powerful weapon against …

Read moreInternet Freedom enemies, who they are in fact? China, Russia, US, or others?