Human failure is the single biggest contributing factor to security incidents, hacks and data breaches. Social engineers, cybercriminals that invest in human errors rather than technical vulnerabilities, are always on the lookout for exclusive opportunities to incite strong feelings in their targets and prod them to make a fatal mistake.
The anxiety and uncertainty surrounding the immigration ban in the U.S. provides the perfect climate for social engineering attacks, a fact that is largely ignored while the political aspects of the ban are being highlighted and fanned with ample frequency by the media. Continue reading
Over the past decade, the gaming industry has gone through immense revolutions and transformations. The old model of paying once with cash and buying games of the shelf is slowly giving way to platforms such as Steam and app stores where you buy games online or pay as you play.
Games have now become full-fledged commerce platforms and markets, where players spend money to pay for services, access expansion packs and extra levels, or buy and exchange in-game assets and resources with other players. Continue reading
We’ve been saying this for many years: This year’s cyberattacks dwarfed last year’s. And in this regard, 2016 was no exception. From online fraud to account takeovers and data breaches, and everything else, attacks were dished out in bigger sizes and higher frequencies than before.
Some trends such as ransomware and DDoS attacks dominated the headlines, but that was not all 2016 had in stock. While experts might differ on which were the biggest hacks of the year, there’s no denying that the following four cases were really unprecedented in their own kind. Continue reading
By David Niki, Comelite IT Solutions
Chatbots are the buzzword du jour and are slated to replace service apps and websites, some believe. While it’s too early to lean make such extreme assumptions, there are intuitive ways bots can be used right now, and a proper usage can have significant impact in app development and reduce production costs.
In this article we are sharing the experience we gained during development of Universal Chat; a bot ecosystem based on Telegram’s Bot API, as well as Facebook Messenger, Skype and Slack—Universal utilizes them all. Continue reading
I love Twitter, have been using it for years, and my Twitter account is much more active than my LinkedIn or Facebook. I use it regularly to share my latest articles with my followers, share links to other scoops and articles that are worth reading, post amusing comments on others’ posts, or simply vent my frustration when a particularly complicated article is giving me a hard time.
But Twitter gets frustrating as soon as exchanges start to get technical and lengthy in nature. And my latest episode happened yesterday, after VentureBeat ran my latest article, which explored the intersection of blockchain and cybersecurity. Continue reading
By Bryn Farnsworth, iMotions
That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.
There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading
By Gary Southwell, Seceon
The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats: “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading