5G and IOT – Symbiotically Changing the World
![](https://www.aurorait.com/wp-content/uploads/2023/01/5G-and-IOT-Symbiotically-Changing-the-World-1024x576.png)
Introduction When Graham Bell invented the first working telephone in 1876, almost a century and a half ago, never would he have imagined even in his wildest dreams where his invention would go, or what avenues would unfold as a consequence. Yet it wasn’t until another 60 years later in 1936 when Alan Turing built […]
Cyberterrorism – A Devastating Reality
![](https://www.aurorait.com/wp-content/uploads/2023/01/cyberterrorism-1024x576.jpg)
One of the crudest but also true-to-life jokes about the advent of online goes like this: “Terrorist organizations have decided to get into online crime to keep up to date. They have just launched a new app called Pay-Up-Pal.” A joke, yes, but one that is driving cyber criminals today, hell-bent on making online fraud, […]
Breach Fatigue Tips for Protecting Your Organization in a Constant Cyber Threat Landscape
![](https://www.aurorait.com/wp-content/uploads/2023/01/breach-fatique-1024x576.jpg)
Introduction The Aesop fable of the boy who repeatedly raised false alarms about a big bad wolf teaches us that people may become inured to repeated warnings, even if they are eventually proven true. This resonates with how people are currently responding to data breaches – they are becoming more accepting of them rather than […]
What’s on the Horizon? Top Cybersecurity Predictions for 2023 by Aurora President, Philip de Souza
![](https://www.aurorait.com/wp-content/uploads/2023/01/2023-cybersecurity-predictions-1024x570.jpg)
2023 – The year of things cyber Just about recovering from the ravages of Covid-19, only to see it resurface, 2023 seems to be the year of things cyber, going by some of the major predictions that are doing the rounds. This is despite climate change continuing to be a hot topic the world over. […]
Why Every Cybersecurity Person Needs To Think Like a Hacker
![](https://www.aurorait.com/wp-content/uploads/2022/11/Why-Every-Cybersecurity-Person-Needs-To-Think-Like-a-Hacker-1024x683.png)
Why every cybersecurity person needs to think like a hacker Introduction In the world of football, it is not uncommon to see coaches’ pore over video recordings of opposing teams’ matches in the endeavor to understand their plays, game strategies and strengths and weaknesses. The reason is not difficult to discern. In order that they […]
The Potential of Artificial Intelligence in Cybersecurity
![](https://www.aurorait.com/wp-content/uploads/2022/11/The-Potential-of-Artificial-Intelligence-in-Cybersecurity-1024x683.png)
The Potential of Artificial Intelligence One of the most ready references of Artificial Intelligence (AI) at work comes from Netflix’s AI-driven tool – the Netflix Recommendation Engine (1) – that suggests which new film or serial you are likely to enjoy, based on your user profile and rating of other films or serials you’ve seen. […]
Common Causes For Malicious Data Breach
![](https://www.aurorait.com/wp-content/uploads/2022/11/Common-Causes-For-Malicious-Data-Breach-1024x683.png)
Malicious data breaches – and what you need to know about them Introduction A data breach is a security violation, in which an organization, institution or individual’s confidential data is compromised by a conscious act of malice on the part of an authorized or unauthorized person or set of persons. The act will almost always […]
The Rise of Automotive Hacking
![](https://www.aurorait.com/wp-content/uploads/2022/11/hacking-scaled-1-1024x683.jpg)
In March 2022, concurrent with Tesla offering free charging of Electrical Vehicles in Ukraine, to help spur residents flee the war-ravaged country, came the announcement of EV stations in Moscow being hacked and disabled. A few years earlier in 2020, engineers stage-managed testing of cyber hacking of EV stations. (1). While it was not disclosed […]
The Cloud Is Also Vulnerable
![](https://www.aurorait.com/wp-content/uploads/2022/11/vulnerable-1024x683.jpg)
A good definition of ‘Vulnerability’ where the cloud is concerned comes from Cloud Security Alliance (1). It defines vulnerability as a weakness in the system and not a software bug. For this reason, it can lie dormant till discovered and either remedied or exploited. It is essentially therefore a state waiting to be triggered by […]
Ransomware – Next Level Malware
![](https://www.aurorait.com/wp-content/uploads/2022/10/Ransomeware-1024x683.jpg)
You could say it was a trend simply waiting to happen. With the proliferation of networking, digital devices, online activity, Covid et al, the stage couldn’t have been more perfectly set for ransoms to evolve from hostages in the real world to data in the digital world. From an evolutionary point of view, also this […]