von Smidcloud | Okt 30, 2017 | Cybersecurity breaches and incidents
The KRACK (Key Reinstallation) attack takes advantage of a security flaw found in the WPA2 protocol. This is the protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim’s Wi-Fi can exploit these weaknesses using KRACK; this...
von Smidcloud | Sep 25, 2017 | Cybersecurity breaches and incidents
News about computer incidents, cyberattacks and hackers appear every day in the media, but which were the first? How did it all start? We are going to review when cyberattacks began, how they have evolved and clarify the terms used. Violence is a complex concept and...
von Smidcloud | Sep 12, 2017 | Cybersecurity breaches and incidents
The business of ransom is not new[1], it is based on hijacking or holding back something of value to someone and then asking for a ransom for it. In the case of Ransomware what is hijacked is the digital information we have in the devices to which the attackers gain...
von Smidcloud | Jun 7, 2017 | Cybersecurity breaches and incidents
Today’s modern world’s digital technology has not only made our lives easier but it has also provided abusers an opportunity to exploit and take advantage of the loopholes in the security system of any such technological systems. Use of electronic devices to unlock...
von Smidcloud | Jan 25, 2017 | Cybersecurity breaches and incidents
It is time to continue with the review of the biggest cyber-attacks and data breaches of the 21st Century and what could have been done to prevent them. You will find more cases of the worst security breaches of 21st century in the part 1 of this article. 6. NASA...
von Smidcloud | Jan 9, 2017 | Cybersecurity breaches and incidents
Cyber-attacks are as old as the advent of cyberspace. When the technology was new and cyber security had yet to gain its due importance, the cyber attackers took full advantage of its vulnerabilities and caused damage in millions. With time, the technology grew...