Home Authors Posts by Gabriel Sita

Gabriel Sita

31 POSTS 0 COMMENTS
Fitness trackers

4 Things You Didn’t Know About Fitness Trackers and Security

Smartwatches, trackers and fitness trackers can expose networks if they are not properly connected and managed. What and how much security risk activity trackers pose to IT? Well, more than you might think. Hackers target...

cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
Tor Browser for Android

Tor Browser for Android

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online. Features BLOCK TRACKERS Tor Browser isolates each website you visit...

The Four Most Serious Threats Facing Online Businesses In 2018

Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and cryptojacking. Businesses can’t afford to ignore online crime. The average cost of...
Malware

You Can’t Stop All Malware, But You Can Stop The Damage

Organizations cannot stop all malware with today’s endpoint security technologies, but they can mitigate the damage that malware intends to cause. To do so, they will need to implement a defense-in-depth strategy with an...
cybersecurity

Are You Correctly Tackling The Cybersecurity Challenge?

With the rapid adoption of the Internet of Things (IoT), we are moving towards an entirely interconnected world, from smart organizations to smart cities. No one can dispute the power that IoT presents, but...
ransomware attack

Local Backups May Not Keep Your Business Safe From Ransomware

In the last few years, a series of devastating ransomware attacks has cost businesses billions of dollars. Ransomware doesn’t discriminate: businesses of all sizes have been hit hard, but smaller businesses are disproportionately affected...
Cyber

How To Protect Your Business From Cyber-Attacks?

Cyber threats have become a scary reality with a high percentage particularly targeting individuals and businesses. No matter what the company’s government stature or the size of the business or who the individual victim,...
DDoS Attack

Best Practices For DDos Mitigation In The Terabit Attack Era

IoT botnets changed the DDoS attack landscape, but not necessarily in the way many people thought they would. The Mirai IoT botnet was, initially and with much success, used to launch a high volume...

Let Passwords Go Extinct Or, It’s Time For Passwords To Evolve

Passwords are Dinosaurs Let's face it: passwords have become part of the cybersecurity problem. That sounds contradictory, as passwords are supposed to help keep things safe, but it's true. Passwords are the seed of a...
205FansLike
0FollowersFollow
2,609FollowersFollow

More Articles