EH Academy Blog

Inside Out of the Academy

Why Cybercriminal Seeks Medical Data?

Nowadays, data stolen from banks and other financial institutions become useless once the breach is discovered and passwords are changed. But the data from healthcare firms and industries that include both personal identities and histories can live for a lifetime. Earlier this year, a hospital...

READ MORE

Adopting Security Habits From highly Secure Companies

Large organizations are highly concerned with their security policies and strategies to make their business a great success. For that they plan each and every thing prior with complete management and take some serious steps to make full proof security plans. Nowadays, security plan is highly...

READ MORE

Where to Start as a Cyber Security Researcher?

From IoT (Internet of Things) to big enterprise applications, devices and applications are being discovered vulnerable every day. The field of Global technology is expecting various threats in the upcoming years because of the shortage of cyber security professionals. Cyber security researchers...

READ MORE

7 Ways to Fight Ransomware

Ransomware is now the biggest cyber security threat that global community is facing. In 2016, there has been a constant flow of new ransomware families popping up like locky ransomware and etc. according to Kaspersky’s quarter 1 report of 2016 ; security experts have detected 2900...

READ MORE

Why CISOs Get Fired

In the world of emerging cyber security risks and attacks the demand for effective risk management is converging with other factors that could put the CISO role on the endangered species list. The Chief Information Security Officer’s (CISO) job description is changing rapidly. The new CISO jobs...

READ MORE

The Atlas of Cyber Crime

Cyber crime in the past few months is highly accelerated and has a great impact on the global economy and information exposure threat as well. Many countries are being affected by cyber crime and there seems to be no solution to protect them. According to a report on cost of data breach by...

READ MORE

The return of Locky Ransomware with New Targets

Locky was reported as a destructive ransomware, it was infecting computers belonging to healthcare facilities and hospitals in the United States, New Zealand, and Germany. Earlier this year, a ransomware attack of unknown origin has targeted Hollywood Presbyterian Medical Center in Central...

READ MORE

Rise of Bug Poachers, a New Cybercrime

Cyber security is the field that is evolving rapidly. We see many hackers every day attacking our systems; at the same time cyber security researchers tend to protect us with prior exploration of the vulnerabilities in our systems. Many researchers, who are working to secure systems, also face...

READ MORE

CISCO Sponsors $10 Million Cybersecurity Scholarship to Overcome Global Shortage

We hear new stories every day concerning security breaches, leaving the organization and its customers affected. Attackers are more skilled than the organization’s cyber security professionals. The gap of cyber security skilled work force is increasing every day. Although, many universities are...

READ MORE

Hack Any Facebook Account using Phone Number

Facebook as we all know is the widely used social networking application. Millions of people use this application every day to get connected with their friends and family around the world. No doubt Facebook is eagerly working to protect their users; and, the hackers are also trying to hijack...

READ MORE