Category: Uncategorized

Uncategorized

Disa nga hapat për të siguruar biznesin apo platformën tuaj në hapësirën kibernetike

Disa nga hapat për të siguruar biznesin apo platformën tuaj në hapësirën kibernetike Shumica e bizneseve të vogla dhe të mesme kanë tendencë të kenë një ide të gabuar se për shkak të madhësisë së tyre, hakerat do të jenë më pak të interesuar për ta dhe përkundrazi do të preferojnë të synojnë ti sulmojnë…

Uncategorized

IDENTIFIKO Fake Pages në Facebook

IDENTIFIKO Fake Pages në Facebook Kohëve të fundit është shtuar hapja e faqeve të rrejshme në Facebook në emër të kompanive të mëdha në Kosovë me qëllim të dëmtimit të imazhit dhe mashtrimit të qytetarëve. Qëllimi i këtyre personave është krijimi i një audience në Facebook përmes mashtrimit në emër të disa kompanive. Me qëllim…

Uncategorized

Students become ‘white hat hackers’ in national cyber security project

Isabella Hogan doesn’t use Snapchat, Facebook or Twitter and has recently cut back on how much she uses Instagram, for safety reasons. “You can mistakenly post things on Instagram that you don’t think are there, people you don’t know could find out where you live, get your information, take your money,” the year 8 student…

Uncategorized

What’s the difference between White-Hat vs Black-Hat hacking?

The term hacker often brings up a lot of negative connotations. In the media, for example, “hackers” are usually cybercriminals who are hacking into some sort of computer infrastructure for malicious purposes. However, a hacker is anyone, regardless of intent, who uses their knowledge of computer hardware and software systems to infiltrate and bypass the…

Uncategorized

Cybersecurity Skills Shortage Tops Four Million

Global IT security skills shortages have now surpassed four million, according to (ISC)2. The certifications organization compiled its latest Cybersecurity Workforce Study from interviews with over 3200 security professionals around the world. The number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and…

Uncategorized

New cyber security guide is the first to gather global expertise

Some of the world’s leading experts in cyber security have pooled their academic and industry insights to produce an authoritative guide that could help organisations to future proof their resources. The guide, the first of its kind, will also help expand the capabilities of those who will be at the forefront of tackling the challenges…

Uncategorized

Indian nuclear power plant’s network was hacked, officials confirm

After initial denial, company says report of “malware in system” is correct. The Nuclear Power Corporation of India Limited (NPCIL) has acknowledged today that malware attributed by others to North Korean state actors had been found on the administrative network of the Kudankulam Nuclear Power Plant (KKNPP). The admission comes a day after the company issued…

Uncategorized

40 Stunning Hacking Statistics that Concern Us All in 2019

Have you ever considered that nearly every electronic device can be hacked? I know I have. Today we’ll look at some hacking statistics to illustrate the impact of hackers’ activities in modern society. Naturally, hacks are a great concern for website owners – that’s why all reviews here on Hosting Tribunal focus heavily on security…

Uncategorized

Cyber threats to consider this Cyber Security Month

The biggest cyber threats, their consequences and how to protect yourself and your businesses. (Image credit: Image source: Shutterstock/jijomathaidesigners) October marks European Cyber Security Month – an awareness campaign aiming to promote the importance of information security and highlighting the simple steps that can be taken to protect data, whether personal, financial and/or professional. This…

Uncategorized

Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking in IoT

On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the importance of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. They have focussed on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerabilities in exchange for…