Posts

Showing posts with the label Cyber Security

No one is exceptional of cyber-security threats

Image
Enterprises everywhere need to watch out! With cybercriminals increasing their ambitions, constantly evolving hacking techniques year over year, and with emerging technologies providing more attack surface for hackers, executives and IT leaders must plan for the inevitable. They must know how to respond when a security breach happens, because it will happen. In 2019, every organization should be prepared for these top five security threats. 1. Ransomware & Malware: More Costly than Data Breaches Ransomware is already on track to hit $11.5B in damages for 2019, which roughly translates into someone becoming a new victim every 14 seconds. Using malware or software to deny access to a computer or system until a ransom is paid, these threats are more costly than traditional data breaches alone. But ironically, it’s not the threat of paying a ransom and the cost of stolen data that’s proding executives to heighten their security protections. These days, the motivating factor is m...

How to stay safe while navigating online

Image
"If you want to stay safe, throw away all your connected devices," is an oft repeated advice you will come across in response to the question of how to make yourself "unhackable".  The sad truth is that anything that has been made, especially involving software, can be broken into. What we can do as users and consumers of technology is ensure that we follow some basic principles and precautions. Emails If it's too good to be true, maybe it is. Avoid following links in emails or text messages to log into your sites or change passwords WiFi Avoid free WiFi, especially in unknown or new places. When you must use it, use a VPN Watch out for safe websites Make sure the websites with which you transact financial business are secure. Look for the lock icon and/or a web address that starts with https://”(the “s” stands for secure) Protecting yourself by securing your devices, software and connections is important, but making the right choices when doing thin...

What Can I Do with a Bachelor’s in Software Engineering?

Image
With a bachelor’s in software engineering, you can be competitive for many mid-level positions in software development as well as for jobs in related fields like cyber security.  There’s a good deal of variety. You can vie for positions in the business, communications, health care, or gaming industries. You can also work on embedded software projects; this type of software is used in virtually every industry, from medicine to aeronautics. Here is a look at some of your options. [ Find a Bachelor's in Software Engineering program near you ] “I don’t know of software engineering graduates who haven’t had jobs when they graduate” - Dr. David Dampier, Associate Professor of Computer Science & Engineering at Mississippi State University Software Engineer (Corporate) Software engineering programs prepare students to do more than code. Bachelor’s educated software engineers may work at any stage of the software development life cycle.  Duties can include eliciting ...

Cyber-thieves turn to 'invisible net' to set up attacks

Image
Cyber-thieves are creating an "invisible internet" to stop police spying on cyber-crime deals being done on the dark net, research suggests. Instead of trading on marketplaces, criminals have turned to "gated" chat forums, invitation-only communities and encrypted apps, say researchers. The change could make it hard for law enforcement agencies to spot and trace attacks, they warn. They also found a large increase in attacks aimed at big companies. Hidden chatter The study embedded undercover researchers into a wide variety of forums and gated chat forums on the dark net. The dark net is the part of the internet not accessible to search engines such as Google, and for which people need a special browser to visit. The most well-known dark net is accessed via the Tor browser. Successful efforts by police to infiltrate dark net marketplaces as well as raids that saw many of them closed down, had pushed criminal hackers to adopt more secure ways of comm...