EH Academy Blog

Inside Out of the Academy

5 Security Practices that Create Hurdles for Hackers

Majority of hackers believes that no password is secured from them, whether white hats or black hats. There are many hackers that are working to help and report vulnerabilities they found for the government, law enforcement, intelligence and military. Although organizations are working towards...

READ MORE

5 Cyber Security Mistakes Organizations must Avoid

The companies whether enterprise, small businesses or startups, are either based online or have different services online for their customers. And the reality is, just by conducting businesses online, they are threatened by cyber crime. A single incident can cause loss of trust from customer and...

READ MORE

Locating ISIS & other Threats using OSINT for Dummies

Information does not need to be secret to be valued. The information that we access every day is somehow valuable to us in different manners. It’s up to us that how we make the most of it. The blogs we browse, the broadcasts we watch, business websites, videos, social networks, forums or the...

READ MORE

Why Cybercriminal Seeks Medical Data?

Nowadays, data stolen from banks and other financial institutions become useless once the breach is discovered and passwords are changed. But the data from healthcare firms and industries that include both personal identities and histories can live for a lifetime. Earlier this year, a hospital...

READ MORE

Adopting Security Habits From highly Secure Companies

Large organizations are highly concerned with their security policies and strategies to make their business a great success. For that they plan each and every thing prior with complete management and take some serious steps to make full proof security plans. Nowadays, security plan is highly...

READ MORE

Where to Start as a Cyber Security Researcher?

From IoT (Internet of Things) to big enterprise applications, devices and applications are being discovered vulnerable every day. The field of Global technology is expecting various threats in the upcoming years because of the shortage of cyber security professionals. Cyber security researchers...

READ MORE

7 Ways to Fight Ransomware

Ransomware is now the biggest cyber security threat that global community is facing. In 2016, there has been a constant flow of new ransomware families popping up like locky ransomware and etc. according to Kaspersky’s quarter 1 report of 2016 ; security experts have detected 2900...

READ MORE

Why CISOs Get Fired

In the world of emerging cyber security risks and attacks the demand for effective risk management is converging with other factors that could put the CISO role on the endangered species list. The Chief Information Security Officer’s (CISO) job description is changing rapidly. The new CISO jobs...

READ MORE

The Atlas of Cyber Crime

Cyber crime in the past few months is highly accelerated and has a great impact on the global economy and information exposure threat as well. Many countries are being affected by cyber crime and there seems to be no solution to protect them. According to a report on cost of data breach by...

READ MORE

The return of Locky Ransomware with New Targets

Locky was reported as a destructive ransomware, it was infecting computers belonging to healthcare facilities and hospitals in the United States, New Zealand, and Germany. Earlier this year, a ransomware attack of unknown origin has targeted Hollywood Presbyterian Medical Center in Central...

READ MORE