Blog

Analysis of a Cyber Attack: Capital One

Analysis of a Cyber Attack: Capital One

Analysis of a Cyber Attack: Capital One By Jose Maria Blanco An attack on Capital One's cloud environment between March and July of this year compromised the personal data of approximately 100 million...

MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary

MSSP Software: Agnostic vs. Proprietary Managed Security Service Providers (MSSPs) use specialized software to monitor the environment of companies they provide services for. Security Information Event...

Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security

Alert: Threat of Online Skimming to Payment Security The Payment Card Industry (PCI) Security Standards Council has released a new alert. The alert warns of the threats of online credit card skimming to...

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware

5 Ways Cities Can Prevent Ransomware Ransomware has frustrated IT professionals and end-users since the '90s. In recent months, the technique has victimized government organizations. Ransomware is typically...

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity?

Which Country is #1 in Cybersecurity? Last week was Independence Day in the United States and Canada Day. These holidays celebrate freedom and independence. Security is a key component of independence. If a...

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication

10 Most Secure Methods of Communication Communicating in a fast and modern way brings with it the possibility of privacy invasion and security concerns. Whether it be a large technology company snooping for...

Biometric Hacking

Biometric Hacking

Biometric Hacking Biometric identification is in the palm of every modern smart phone users' hands. People can unlock their devices with their face, eyes or fingerprints. Businesses have adopted biometric...

How Blockchain Can Be Hacked: The 51% Rule and More

How Blockchain Can Be Hacked: The 51% Rule and More

How Blockchain Can Be Hacked: The 51% Rule and More The infamous criminal Willie Sutton was once asked why he robbed banks, and his response was "because that’s where the money is." Blockchain technology...

How SIM Card Hijacking Works

How SIM Card Hijacking Works

How SIM Card Hijacking Works Last month a hacker who stole $5 million resulting from SIM Hijacking was sentenced to 10 years in jail. In the end, SIM Hijacking or SIM Swapping results in your phone number being...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.

Are you ready to take your cybersecurity
to the next level?


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

La Seguridad Gestionada será el tema central de nuestro #webinar del 4 de marzo. Os explicaremos en qué consisten los servicios de #MSS y #MDR, cuáles son ... sus diferencias y las ventajas para cada tipo de negocio.
Apúntate aquí ➡ http://bit.ly/2wngX19


Social Media

Facebook

Enquanto nosso All Associates Meeting acontece no auditório, a Globo/Globonews grava entrevista sobre Segurança no carnaval com nosso diretor Red Team Services Fernando Amatte. #cipheraprosegurcompany #novostemposnovosmovimentos ... See MoreSee Less

View on Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 

Learn more

\