Do you think Elon Musk is designing a new Tesla model or SpaceX rocket without considering that his new technology must have the best systems security? When you are the top leader in your industry, even in technology innovation, someone will always try to negatively impact your brand, or steal your secrets. You better believe every piece of software or hardware designed into Musk’s products or creations is tested for vulnerabilities and defects. This is one of the reasons why we don’t hear any of his brands ...
Cyber Penetration Testing: Not Elon Musk Science
SMBs TIME TO IMPROVE ENDPOINT SECURITY — OR PAY THE CONSEQUENCES
Small- and medium-sized businesses (SMB), cyber security protection must be a top priority. Here’s why. 55% of SMB’s surveyed revealed that their companies had experienced a cyber attack in the past twelve months, and half had experienced data breaches involving customer and employee information in that same time frame according to a Ponemon Institute survey.1...
Cyber Threat Alert: Emerging Cyber Threats and Cyber Security Issues
The DefendEdge team is constantly monitoring the cyber threat landscape. We have identified two emerging threats and a cyber security issue of particular concern, and are calling them out so you can take proactive steps to protect you organization. Below you will find a brief description of each individual threat, as well as links to resources that offer more information regarding the threat....
Cyber Threat Alert: National Lottery Hacked, Likely Stolen User Name and Password to Blame
It’s happened again. This time the National Lottery was hacked by cybercriminals. The accounts of more than 26,500 lottery players were compromised, according to a recent Infosecurity Magazine article. 1...
Cyber Threat Alert: Massive Gooligan Malware Campaign Targets Android Devices
Over one million Google accounts have been breached by a new and growing vicious malware attack campaign named Gooligan. The breaches are increasing at an additional 13,000 devices each day.1 The malware roots infected devices and steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive, and more....