Category: Cyber Security

The Cyber Risks of Two-Factor Authentication
Cyber Security

Major Risks of Two-Factor Authentication

Phishing attacks are only successful because of the psychological manipulation of social engineering. By using well-known security methods like 2FA, cybercriminals not only manipulate victims into handing over sensitive personal data but also reinforce a false sense of security for employees and company admins.

Read More »
Cyber Security

Hub Security Releases First-of-its-kind Quantum-proof Programmable HSM

Hub Security’s newest flexible HSM will help organizations weather the coming evolution of cyberattacks and threats related to quantum computing. While current industry-standard HSMs are equipped to run quantum computing algorithms, many of them provide these capabilities purely on a software level, making them low-performing and unsuitable for cloud and payment processing and other real-world applications.

Read More »
Aviation Industry Grapples with Basic Cyber Protection
cloud security

Aviation Industry Grapples with Basic Cyber Protection

The latest hack signals how imperative it is for enterprise airlines to ensure Infosecurity best practices are put in place in order to avoid future devastating data breaches from taking place. The industry as a whole lacks strict requirements to prevent such incidents or even adhere to specific cybersecurity standards.

Read More »
Homomorphic Encryption
cloud security

What is Homomorphic Encryption?

Homomorphic encryption is a method of encryption that allows computations and queries to be performed upon fully encrypted data, making it possible to analyze or manipulate encrypted data without decrypting it. 

Read More »
Secure remote voting
blockchain

The Pathway to Secure Remote Voting

In fact, blockchain voting has already been creating waves and changing elections. Overseas military from West Virginia, USA for example can already vote in their local elections using just their mobile phones. A combination of encryption and blockchain registry then tallies their votes.

Read More »
Hacker threats and risks
cloud security

What is Ransomware?

In this article, we’ll take a bird’s-eye view at what ransomware is, who it targets, and how it works so you can work to defend you and your organization from future attacks.

Read More »