Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Working with a credible Cybersecurity professional means a company should be able to have an up to date and easily understood incident response plan, an improved level of security, both with regards to systems and personnel, and have a trusted expert they can call upon with confidence.
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
The majority of attacks on mobile devices focused on human exploitation, as found in the Proofpoint Human Factor Report.
Mobile Telephone monitoring software (spyware), its effectiveness as an espionage tool and its cost vs potential rewards.
Shipbroker Clarksons confirmed its computer systems were breached in a major cyber-security attack. Today, more than ever, cyber security has to be the number one priority for the shipping industry. Naval Dome will be working with key stakeholders to establish global cyber maritime defence standards and guidelines
There is no better time than now to dive into the world of zero day vulnerabilities. This article looks at how zero days behave, assesses some of the most infamous examples of them, and perhaps most importantly, provides best practices for how to deal with these elusive threats.