• 05
  • Feb2019

How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape

How the Internet of Things (IoT) Is Changing the Cybersecurity Landscape

The devastating global cyber-attack caused chaos across the world, which affected hospitals, businesses and banks. National Initiative for Cybersecurity Education (NICE) had taken sincere efforts to protect organization from costly cybersecurity threats and promote cybersecurity awareness amongst people. With effective user security awareness training programs, every organization are aware about the importance of cybersecurity and […]

read more

  • 10
  • Dec2018

A Glimpse on the Blockchain Security – Its Trends and Implementation

A Glimpse on the Blockchain Security – Its Trends and Implementation

All of us have stored our data online in some way or other. There are many times, where we share our utmost private information in the platforms that we use every day, without even being aware that our data is being collected. There are many users, who conceal their most valuable data with a weak […]

read more

  • 28
  • Nov2018

Social Media Protection – A Checklist of Practical Tips

Social Media Protection – A Checklist of Practical Tips

Awareness is necessary when it comes to Social media protection and cyber blackmailing. By following the below steps, you can make sure to be protected against them. Set up your social media pages (even if you don’t plan to be active), and keep them updated. Enable two-factor authentication for all your social media accounts and […]

read more

  • 19
  • Nov2018

Make Your Organization a Harder Target for Cybercrime

Make Your Organization a Harder Target for Cybercrime

Cyber-threats have become a scary reality for practically in every business field. We must also be aware of Spammers, who attack and hack into to take over a user’s account. Hackers carry out activities like Bulk messaging Spreading malicious links Fraudulent reviews Sharing undesired or excessive content Click baiting Phishing Malware attack System hacking By […]

read more

  • 14
  • Nov2018

Clues to Spot “Fishy” Emails – Phishing Awareness

Clues to Spot “Fishy” Emails – Phishing Awareness

This real incident happened in the year 2016 – ‘Three employees at the University of Kansas failed to receive their recent paychecks, only later they realized they were deceived by the fraudsters.’ One day, the employees at the University of Kansas received an e-mail, asking them to update their payroll information. The scammers had used […]

read more

  • 29
  • Aug2018

Keynote Speech by Eng. Mubarak Al-Hadadi at the Cyber Resilience and InfoSec Conference 2018

Keynote Speech by Eng. Mubarak Al-Hadadi at the Cyber Resilience and InfoSec Conference 2018

I am happy to announce that I am a featured speaker at the 2nd Annual Cyber Resilience and InfoSec Conference, being held at Abu Dhabi, UAE Park Rotana Hotel on September 5 and 6, 2018. Cyber-crimes and attacks have been growing across key sectors such as financial services, oil & gas, construction, government, and healthcare. […]

read more

  • 07
  • Aug2018

Cybercrime Challenges – A Quick Look

Cybercrime Challenges – A Quick Look

In the year 2013, there were only 500,000 malicious applications, but the numbers have increased considerably to over 3.5 million. The strange fact is 77% of the applications are considered to be malware. Hackers are now making use of automated tools to recognize defenseless websites or web pages, and the owner could identify it only […]

read more

  • 12
  • Jul2018

Did you know – Your Whatsapp Account can be hacked in 30 Seconds!

Did you know – Your Whatsapp Account can be hacked in 30 Seconds!

Did you recently get a request from someone from your contacts list on Whatsapp asking for a verification code? Beware! It could possibly be a scammer, on your contact’s Whatsapp, who is making the request, just to invade into your Whatsapp account. This is a new variant in scam, here the scammers get hold of […]

read more

  • 26
  • Jun2018

Never Use your Office Laptop for ‘Personal’ browsing – Beware!

Never Use your Office Laptop for ‘Personal’ browsing – Beware!

When you browse your personal data on your Office Laptop, think twice!!! It is because your personal data is never safe on the office laptop! Though you might try hard to keep your personal and professional lives apart, there is one place, where many people slip – their office laptop! You might think that you […]

read more