Tag: Cyber Attack

Top Cyber Attacks of Q1 2019

In this modern era of technology and connectivity, cyber attacks have become significantly more common. Despite numerous warnings from security experts, consumers remain prone targets for criminals who are not necessarily intent on backing down as of yet. The year 2019 has seen some interesting types of cyber attacks so far, which is not necessarily something to be too happy about. Information regarding these incidents is provided courtesy of CSIS. …
[Read More]

Cyber Attack on Solar Panels Could Disrupt Half of Germany’s Power Grid

Most people would not consider cyber attacks on solar panels to be capable of causing much damage. Researchers, however, have shown that such threats should not be taken lightly. There are multiple vulnerabilities found in products manufactured by the leading providers of photovoltaics. A serious cyber attack against solar panels could shut down an entire nation’s power grid. Hacking Solar Panels Could Be a Thing Given the current popularity of solar panels, it is only …
[Read More]

U.S. Radio and TV Station Still Reeling From Ransomware Attack One Month Later

A ransomware attack can have a long-lasting effect on any individual or company. KQED, a U.S.-based public radio and TV station, suffered a ransomware attack about a month ago. To this day, the group is still trying to fully recover from the aftereffects. KQED was not entirely prepared for this, especially when considering that the attack took its radio stream offline for 12 hours. Never Underestimate Ransomware Attacks The people who …
[Read More]

What is Adaptive Security Architecture?

A data security approach which assumes the target vulnerable at all times. Instead of stopping an attack after the fact, ASA aims to detect and prevent it much sooner. The results of implementing an ASA process include: reduced the attack surface, reduced response time, and reduced threat intensity.  A Secure-Adaptive Architecture In A Nutshell Most people have never heard of an adaptive security architecture, or secure-adaptive architecture as it is officially called. This …
[Read More]