Huawei ban

Huawei ban: What are the consecuences?

US banned Huawei. Something to worry about? Last Thursday, a new battlefront erupted in the trade war between the US and China. President Donald Trump included telecom giant Huawei on a so-called commercial “blacklist”. What does this mean? That American companies will not receive licenses to do business with Huawei, with some exceptions. Yesterday, Google…

supply chain

ASUS supply chain attack: lessons to learn

A complex supply chain attack In what we can call a complex cyber-espionage operation, hackers infected tens of thousands of computers of Taiwanese brand ASUS, through a supply chain attack. The security researchers at Kapersky Lab reported that they detected at least 57,000 infections among customers of their anti-virus application. About half of those clients…

Ethereum misappropriation

Argentina: First sentence against Ethereum misappropriation

A Ethereum misappropriation sentenced in Argentina’s courts In what appears to be the leading case in the matter, the judicial branch of the Argentine province of Chaco issued the first conviction for misappropriation of cryptoactives, in the case 500 units of the Ethereum cryptocurrency, which, at the time of the event, had a valuation of…

crypto theft

How to protect you from crypto theft

Crypto theft comes in many different forms, and at least $225 million of cryptocurrency has been stolen as of mid-2017. Crypto theft can be prevented by taking appropriate precautionary measures (encrypted backups anti-virus software for crypto, and opting for multi-factor authentication among others). Courtesy of: Visual Capitalist For more information on crypto you can contact…

data breach

Data breach at Equifax: Two lessons learned

A mix of human frailty and lack of proper controls On September 7 this year, the consumer credit rating company Equifax, announced a cybercrime incident. Also, the statement indicated that the event potentially affected almost 145 million US consumers, along with several records from consumers of other nationalities. Information accessed by the attackers included first…