The Rise of Smartphone BotNets Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is… Daniel Smith | May 25, 2016
You’ve Been Clickjacked! So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and… Ben Zilberman | April 28, 2016
Cybersecurity in the Real World: 4 Examples of the Rise of Public Transportation Systems Threats Public Transportation is the lifeblood of any economy and the circulatory system of modern day societies. From train, plane to… Carl Herberger | April 21, 2016
At Risk for DDoS Outages? If You Answer Yes to the First Five Questions – WATCH OUT! We’ve all seen executives boast after a high profile cyberattack outage that they have done all that they can do… Carl Herberger | March 24, 2016
Today’s Cyber Security Threats in the Telecom Industry Today the Telecom industries provide a wide array of global services that communicate with millions of customers. This diverse business… Snir Ben-Shimol | March 23, 2016
Is Your Organization In the Ring of Fire? Schools are getting more sophisticated; there is no doubt about it. My kids recently had an "emergency study exercise" in… Shira Sagiv | March 17, 2016
Every Political Action Causes a Cyber Reaction Just as Newton’s Third Law of motion states “for every action, there is an equal and opposite reaction” a similar… Carl Herberger | August 28, 2014
Cyber Attacks on Oil and Gas A few weeks ago, news agencies shared reports on the Energetic Bear attack. This cyber-attack, or rather virus, was reportedly… David Hobbs | July 11, 2014
Five Indications that an “Electronic Pearl Harbor” is Possible, if not Plausible During the past year, we have become numb to the sheer outrage of cyber-attacks and the devastating impacts they have… Carl Herberger | December 6, 2013