How SIM Card Hijacking Works

Last month a hacker who stole $5 million resulting from SIM Hijacking was sentenced to 10 years in jail. In the end, SIM Hijacking or SIM Swapping results in your phone number ...
Read More

How Blockchain Can Be Hacked: The 51% Rule and More

The infamous criminal Willie Sutton was once asked why he robbed banks, and his response was "because that’s where the money is." Blockchain technology and the related ...
Read More

Instant GDPR Best Practices Assessment

Since the General Data Protection Regulation (GDPR) went into effect in May 2018, many companies have been fined for failing to live up to the regulation. Google was recently ...
Read More

CIPHER Selected as Top 10 Best Performing MSSP

CIPHER is honored to be selected as a Top Managed Security Services Provider (MSSP) by Insights Success Magazine.
Read More

Ways to Protect Your Org from Insider Threats

Data theft and insider threats are a significant problem for organizations of all sizes. Most employees have access to documents and information that they themselves created, ...
Read More

Avoid these Common Security Misconfigurations

Security misconfigurations are still part of OWASP’s Top 10 Security Risk list. This indicates they have been a persistent issue over the years. Security misconfigurations ...
Read More

Tips for Securing Internet-Connected Cameras

Once a digital video camera is connected to the Internet, it immediately gets an IP address and may start sending information about itself. Using this IP-address, any such ...
Read More

The Top Ways Threat Actors Steal Sensitive Data

We all are aware that there’s an almost infinite number of hackers out there whose absolute goal it to steal and misuse any sensitive data they get their hands on by any means,
Read More