Team e-LockFeb 28, 20204 min6 Steps In Building A Foundation For Cyber IntegrityCyber security encompasses both the concept of system integrity and file security. System integrity covers the state of infrastructure -...
Team e-LockSep 18, 20182 minHow To Defend Against A Similar British Airways Hacking IncidentA data breach on British Airways' website has resulted in the theft of 380,000 booking transactions data made between 21 August and 5...
Team e-LockAug 16, 20183 minFBI: A Global ATM Cash-Out Attack Imminent.A worldwide, highly choreographed ATM hack dubbed "ATM Cash-Out" or "Unlimited Operation" could be imminent warns the FBI (Federal Bureau...
Team e-LockAug 7, 20183 minWhy Did Reddit Got Hacked Despite Having 2FA Security?A newly disclosed breach that stole password data and private messages is teaching Reddit a lesson that security professionals have known...
Team e-LockMay 15, 20185 minCybersecurity: Threats & Mitigation Video 4 of 4-- Transcript -- Backup is actually one of the most important steps that you should do with your IT system, whether is a server, personal...
Team e-LockMay 14, 20182 minCybersecurity: Threats & Mitigation Video 3 of 4-- Transcript -- Typically for social engineering, firstly I must identify my target, know what to do and the scope of my attack. Then I...
Team e-LockMay 7, 20182 minCybersecurity: Threats & Mitigation Video 2 of 4-- Transcript -- Let’s switch to this hot topic - in 2017, WannaCry and Petya. What is WannaCry? Basically it is ransomware attack back...
Team e-LockMay 7, 20182 minCyber Security Threats and Mitigation: Video 1 of 4-- Transcript -- Shadow Brokers - a Group of hackers who specialise in hacking NSA (National Security Agency), exposing hacking tools...