Fight against online threats and cyber-crime continues.

In the IT industry, security articles and agencies continue to analyze and draw conclusions from the Sony Pictures massive breach and
apparently, the Interview movie has been cancelled. Have the hackers won?

Our own security blog provided 6 important Internet security predictions that will affect all of us in 2015.

Our goal is to bring you the latest security news from the digital world. And this is what we do.

These are the 10 security articles of the week that you should read in order to improve your online security.

Security articles of the week


1. The 12 scams of Christmas

Christmas time is upon us and everybody is out there shopping for family members and friends. But hackers and online criminals are also expecting your credit card details. So, read this article and find out about the scams and schemes created for you.

2. Should Your Company Get Cybersecurity Insurance?

Major corporate data breaches seem to be like weather. They just happen at a certain moment, no one can say when. Apparently, with so many software vulnerabilities, malicious software and not to forget, the human element, these attacks take place and will affect us for sure. So, maybe we should treat them like car accidents and simply get a cybersecurity insurance?

3. Get The Interview Online: A Five-Point Plan To Help Sony Fight Back Against The Hackers

The hackers won, Sony Pictures cancelled Interview and dirty secrets have been spread all over the Internet. This is for sure a Christmas this company will remember. But maybe there are a few things that could be improved by Sony Pictures, especially their image and maybe, just maybe…their security policy.

4. How the U.S. Could Retaliate Against North Korea

If it is proved and established that North Korea did launch the Sony Pictures cybernetic attack, what should we do then? Or what should the
United States do? Are there any ways to retaliate without setting the world on fire?

5. How Much Your Inbox Is Worth to Cybercriminals

How much valuable information is it gained by breaching your e-mail inbox? Is it about the bank account financial situation or about the sensitive data that may lead to identity theft? Or is it the fact that the same e-mail password has been used for other online accounts? What else are you losing by losing control of our e-mail address inbox?

6. The Troll Hunters

They have long been among us and most times they simply disappear as fast as they have appeared online, leaving their cyber-victims affected about the negative experience they had by meeting them. But no more! A group of journalists and researchers have assembled to stop this Internet threat. No more trolling!

7. Bots Now Outnumber Humans on the Web

Bots have evolved along the years and are now more than humans. Why should we be interested about this issue? It is quite simple. In the cyber-criminal world, they are the first element in an infected computer sending private sensitive information to servers controlled by hackers. Can you tell for sure your computer is not already infected?

8. Cloud security: Do you know where your data is?

What is the cloud security? Where exactly is our data? And is it safe? The virtualized networks are closely connected to the cloud infrastructure. What advantages do we have from the cloud security and why these technology is the next step in the future?

9. How to train your staff on cyber security (and make it stick)

There’s nothing more important these days than hearing and reading about the massive Sony Pictures hack. Do you want your company to be the next victim? Read the article and learn how to establish a strong security policy for your employees.

10. Woman allegedly posted 45,600 terror messages on Twitter

This woman posted on Twitter over 45,000 messages to glorify violence, war and extremism in just one year. Of course, she is accused of spreading terrorist messages and was denied setting up any new Twitter account in the future. Now, that’s trolling at a higher level.


We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?

This post was originally published by Aurelian Neagu in December 2014.

Leave a Reply

Your email address will not be published. Required fields are marked *