Cybersecurity Threats: How To Handle Them?

Sarah Clarke (at Infospectives¹) pushes the thoughts of  Threat Management and discussion of potential Risks in this new Cyber world that we live in. Why do I take this blogpost and want to discuss the topic of Cybersecurity threats? It is true that IBM and every Consulting company doing security work wants to play up this … Read more

2016 Cisco Annual Security Report Insight

The report is located here http://www.cisco.com/c/dam/assets/offers/pdfs/cisco-asr-2016.pdf in case you want to read it.   As the image conveys there are 9515 users paying ransomware every month. which is $34 million in yearly income for the criminals from this  single campaign.   As I have mentioned before there are still large potential numbers of computers susceptible to … Read more

Darknet Has All Our Data – Including When And How We Vote

Remember This? My Blogpost from Dec 29, which is essentially a review of all hacks in 2015, when you tally everything up you get to 120 million records hacked and compiled potentially.   Now we have David Krebs in his blog Krebsonsecurity¹ stating the disturbing trend of using the Darknet data in warranty fraud. Using … Read more