Make Cybersecurity Your Employees’ New Year’s Resolution

Make Cybersecurity Your Employees’ New Year’s Resolution Has your organization taken the necessary steps to improve its cybersecurity posture for the New Year? Here are 6 strategies you can deploy throughout your company to strengthen its security for the rest of the...

How the U.N. is Fighting Back Against Cyber Attacks

How the U.N. is Fighting Back Against Cyber Attacks     It is no surprise that hackers have become increasingly sophisticated in recent years. With more cyber attacks than ever, the United Nations Office of Disarmament Affairs (UNODA) has recognized the need for...

Biometric Hacking

Biometric Hacking Biometric identification is in the palm of every modern smart phone users’ hands. People can unlock their devices with their face, eyes or fingerprints. Businesses have adopted biometric identification techniques for entry into offices and...

How Blockchain Can Be Hacked: The 51% Rule and More

How Blockchain Can Be Hacked: The 51% Rule and More The infamous criminal Willie Sutton was once asked why he robbed banks, and his response was “because that’s where the money is.” Blockchain technology and the related cryptocurrency revolution of recent...

How SIM Card Hijacking Works

How SIM Card Hijacking Works Last month a hacker who stole $5 million resulting from SIM Hijacking was sentenced to 10 years in jail. In the end, SIM Hijacking or SIM Swapping results in your phone number being taken. Your phone number is the key for 2-factor...