Twitter CEO’s account hacked via SIM-card swap attack
A SIM swap attack involves convincing your mobile phone provider to switch your phone number over to a SIM card…
Reduce Fraud with Payment Token
Payment Token is simply using a surrogate of the primary account number (PAN) of a payment card to process a…
Capital One Hacked
More than 100 million individuals in the United States and approximately 6 million in Canada were affected in the breach.…
Social media: An imaginary world that exists in the cyber space
Social media is an imaginary world that exists in the “cyber space” where everything seems perfect; a quixotic platform where…
The ABCDs of Staying Safe Online
Service providers won't force you to secure your account because you are the one that will be affected if your…
Secret Keys – the Data Security Nightmare
Secret keys are useless if its confidentiality could not be assured. Ensuring the confidentiality of a secret key is the…
Password – the Gate of Hell of the Digital Age
A password is used to assure a system or service that the person in question (claimant) is whom it truly…
Blockchain Technology: Re-defining the Cyber Warfare
From regulatory authorities cracking down on blockchain powered cryptocurrencies to both individual and state-sponsored hackers draining crypto-wallets, cryptocurrency Ponzi schemes…