DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script c… Continue reading DDoS attacks and 5G: everything you need to know

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what th… Continue reading Why CSPs Should Care About Phishing

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notor… Continue reading Brute Force Attacks on IoT – Here to Stay?

10 Ransomware Attacks You Should Know About in 2019

Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019. The 2019 ransomware landscape is quite diverse – security re… Continue reading 10 Ransomware Attacks You Should Know About in 2019

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabil… Continue reading 5G: Big CSP “Security as a Service” Opportunity

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us … Continue reading Home Router…, or Trojan Horse?