Smartphones and PCs, an open source world is possible
Gaël Duval is not just a dreamer but a man who does not give in to the dominance of big tech Never before has privacy become a central issue in…
Elisavet Grigoriou explains how “Joint Cyber Unit” will protect European Union form cyberattacks
In this interview we have a topic that is related with cyber security in the European Union. Ms.Elisavet has already mentioned that “The European Union has laid out a vision…
Ransomware Virus is Here
In the modern era with the rapid technological development in both fields of informatics and other sciences, new challenges have been reborn and with very specialized knowledge that need to…
LinkedIn data breach: A second colossal attack affected millions of users!
A recent data breach, back in June exposed 700 million users’ profiles causing great concern The allegations that data for millions of LinkedIn users have been leaked and made available…
Unbound enterprise: data anxiety and the counterintuitive nature of risk
The boundaries around the traditional enterprise have been dissolving for a decade or more. Since the advent of the smartphone, business operations and cybersecurity have become increasingly decoupled from physical…
Scam alert: Deceivers hack Facebook account and pretend to be your “friend”
Cybersecurity experts remain skeptical about Facebook efficiency to protect users While millions of online users actively and constantly use Facebook, fraudsters lurk to massively hack accounts and steal the personal…
It started with a click; how did it end up like this?
As part of our cyber security series, we spoke to cyber security expert Raluca Saceanu about her first-hand experience during the ransomware attack on Ireland’s health service, how Kaseya’s supply…
Cisco Talos, the value of proactive cybersecurity
The ongoing health crisis has uncovered a wide range of issues that businesses at global level, of all types and sizes, have had to face in order to follow up…
Ransomware- It Looks Like This
Cybercrime has seen a steady rise in recent years. Criminals have been using all means available to them to conduct cyberattacks and extort money out of business owners. One tool…