Cyber Attacks Don’t Die, They Evolve

cyber attacks

Cybersecurity often feels like taking one step forward and two steps back. An attack will appear, the security community will respond, and eventually the threat will be eradicated. Then, a few months down the road, the threat reappears in a newer and stronger form. Most commonly, it’s evolved to specifically bypass the defenses created to combat it. This has always been true of cyberattacks. The earliest hackers searched for ways to tweak or re-purpose code after encountering a new defense. Or, rather than search for new vulnerabilities, they found new…

Read More

Future of data storage

Data Cloud Storage mobile security

As cloud computing is gaining more and more popularity, people start asking themselves where it’s going. Its evolution has brought data centre and supporting technology to a whole new level. Cloud computing is not just a tendency any more. It has made it’s way from discovery to becoming an essential part of the business strategy of many organizations. And choosing the right approach means thinking about the future of this strategy. That’s why it’s important to know the advantages of the cloud platform models. Recently, the hybrid cloud environment has…

Read More

BYOD 101: How it Changed Businesses

BYOD or “bring your own device” entered the lexicon in the mid part of the first decade of the new century when it was mentioned in a paper by Ballegas et al at UBICOMP 2005. By 2009, the movement had gained some momentum as employees at Intel began bringing their own devices to work and use them to connect to the corporate network. By 2012, the United States Equal Opportunity Commission had adopted a BYOD policy. Despite this, many employees balked at the trend due to concerns about billing and…

Read More

How to Use Your Android Phone Safely

android smartphone market

Google’s Android operating system is more popular than ever. Unfortunately, Android’s open source architecture and substantial market share have made it a continuing target of malware attacks. According to a recent report by Trend Micro, 79% of all malware threats affect Android. In fact, they report that there have been over a million of these threats in the first nine months of 2013 alone. While some of the statistics may be alarming, there is no reason for Android users to give up their devices. By following some prudent steps, you…

Read More

NFC technology projects from HID Global reach conclusion

HID Global NFC technology projects come to an end at Netflix and Good Technology headquarters HID Global, a secure identity solutions developer, has announced the completion of two pilot projects concerning NFC technology. The pilot projects were meant to examine the capabilities of NFC technology in access management and whether the technology presented a significant risk for existing security systems. These projects were conducted in the headquarters of Good Technology and Netflix. Both companies made use of NFC-enabled mobile devices to participate in the pilot projects. NFC continues to grow…

Read More