Aghiath Chbib

Saturday, May 25, 2019

Build security into your IoT plan or risk attack

There’s huge potential with the IoT, but security must be built into a company’s plan and not tacked on at the end. The Internet of Things (IoT) is no longer some futuristic thing that’s years off from being something IT leaders need to be concerned with. The IoT era has arrived. In fact, Gartner forecasts there will be 20.4 billion connected devices globally by 2020.

Friday, March 1, 2019

How AI Can Help To Define Governments National Cybersecurity Strategies



AI and National Cybersecurity Strategies When we speak about cybersecurity threats, there is nothing riskier and troublesome than the complexity of a modern country, where the digital has taken over all day-to-day operations. Moreover, governments and the state's administration held millions of citizens data and all sorts of sensible data. However, in many cases, their …


Continue reading
How A

Vulnerability exposes location of thousands of malware C&C servers

A vulnerability in a tool used by cyber-criminal gangs is now helping researchers expose the locations of thousands of malware command-and-control (C&C) servers.

Thursday, February 28, 2019

Saturday, February 23, 2019

The Role of cybersecurity in Fintech





Fintech companies rely mostly on their rapid adaptability to emergent changes. That is to say that these companies – the likes of Revolut, Monzo, TransferWise, Acorns, Addepar etc, just to name a few – owe their very existence to their ability to meet their ever-changing user's needs quickly and practically on-the-go. To be able to … 

Continue reading AI: Th

Friday, February 22, 2019

Is AI The New Cybercrime Threat




AI shows that is the answer to cybercrime losses that will cost the world $6 trillion each year by the time we near 2021. Nevertheless, while AI can exponentially increase cybersecurity, it can also perform the task even more complex and very fast. AI can be adopted and modified by hackers, who are always interested to grow and use the latest viable tech in the market to cause harm.
The techniques hackers can use AI to modify security operations are complex and creative. Recognized as an example one of the superior cybersecurity tools, sandboxing technology can be beaten by hackers. This cybersecurity tool enables to separate running applications, usually to decrease system failures or software vulnerabilities, from developing. However, recently found malware has been discovered, “able to identify when they are inside a sandbox and wait until they are outside of the sandbox before executing the malicious code.

Continue reading

PayPal Processes Payments for ‘Stalkerware’ Software Sold to Abusive Partners

The booming industry of spyware to spy on romantic partners doesn’t exist in a vacuum: Companies need financial and tech giants to process their payments and advertise their wares.


Security Magazine

The Hacker News