by Smidcloud | Sep 25, 2017 | Cybersecurity breaches and incidents
News about computer incidents, cyberattacks and hackers appear every day in the media, but which were the first? How did it all start? We are going to review when cyberattacks began, how they have evolved and clarify the terms used. Violence is a complex concept and...
by Smidcloud | Sep 12, 2017 | Cybersecurity breaches and incidents
The business of ransom is not new[1], it is based on hijacking or holding back something of value to someone and then asking for a ransom for it. In the case of Ransomware what is hijacked is the digital information we have in the devices to which the attackers gain...
by Smidcloud | Jun 7, 2017 | Cybersecurity breaches and incidents
Today’s modern world’s digital technology has not only made our lives easier but it has also provided abusers an opportunity to exploit and take advantage of the loopholes in the security system of any such technological systems. Use of electronic devices to unlock...
by Smidcloud | Jan 25, 2017 | Cybersecurity breaches and incidents
It is time to continue with the review of the biggest cyber-attacks and data breaches of the 21st Century and what could have been done to prevent them. You will find more cases of the worst security breaches of 21st century in the part 1 of this article. 6. NASA...
by Smidcloud | Jan 9, 2017 | Cybersecurity breaches and incidents
Cyber-attacks are as old as the advent of cyberspace. When the technology was new and cyber security had yet to gain its due importance, the cyber attackers took full advantage of its vulnerabilities and caused damage in millions. With time, the technology grew...
by Smidcloud | Dec 13, 2016 | Cybersecurity breaches and incidents
Information Safeguarding: from the locker to data encryption In the old days, the idea of safeguarding your important documents meant putting them in a locked safe or even in a locked drawer. With the coming of digital age, so many of old age customs are now outdated...