Cyber Security

The Weaponization of Digital Technology

As humans advance further into the Digital Age, we are all more connected than ever before.  Emerging technologies have afforded us at-home Information Units that play our favorite songs, tablet computers to research different recipes and cooking tutorials, and watches that monitor our pulse and other health indicators, all at the same time. Everyday gadgets

Check Point’s Cyber CTF Challenges

Check Point is one of the leading Cyber Security firms in the world. It was established in 1993 and has only grown from strength to strength. Its Cyber Security products are used globally. Check Point is also one of HackerU’s hiring partners and students of HackerU have found successful employment with Check Point. In the

HackerU On Cyber Startup Observatory’s Israel Landscape Slide

This month, Cyber Security information provider, Cyber Startup Observatory, has compiled its Cybersecurity Landscape Slide Israel, showcasing Israel’s top Cyber Security companies and startups. The Slide aims to help present a clear picture of the current Cyber Security landscape in countries around the world. The Cybersecurity Landscape Slide Israel highlights all the Cyber Security-based companies

AI and Cyber Security

Artificial Intelligence (AI) and Machine Learning (ML): Two phrases that have become major buzzwords in the technology world. Whereas AI and ML used to seem futuristic, like the stuff of movies, today, these technologies can be found in businesses as diverse as banking, advertising, and retail shopping. Banks like HSBC and The Commonwealth Bank of

Cyber Security: The Power of Passwords

It often starts with a roll of the eyes. “Didn’t I just change my password a week ago?” we wonder. It may feel as if we get reminders to change our online banking or social media account passwords every other day, but it’s not as often as you think. It’s Complicated Most people tend to

Top 7 Cyber Security Tips

How can small businesses, large enterprises, schools, and governments ensure that their Cyber Security policies are adequate? What can we all do to protect our data and our people from outside computer threats? Here are our Tips for Cyber Security: 1. Educate Staff on Cyber Security An organization’s employees are its first line of defense.

Malware Hits Cryptocurrency Mining Software

What do The City University of New York, The US Court System, The Queensland Government, The UK Financial Ombudsman Service, and The UK National Health Service all have in common? The websites of these institutions use the Browsealoud software service. Browsealoud is a popular tool for internet users with dyslexia and mild visual impairments, which

Trends in Cyber Security: A Meeting of the Cyber Minds

Trends in Cyber Security: A Meeting of the Cyber Minds At a recent ‘meeting of the cyber minds’ in Ohio, experts from across the cyber world met to discuss the trends that are strongest in the cyber world today – including ransomware, the need for preventing future cyber attacks, and what keeps “the good guys”

Roman Zailkin and Nikita Kurtin, two of HackerUSA’s advisers and experts, have won the Hardware Cyber Challenge.

ZeroNights 2017 Conference, Hardware Challenge By Nikita Kurtin and Roman Zaikin. On November 16th, 2017, we participated in one of the hardware challenges at the ZeroNights conference. The challenge was created by Gleb Cherbov. This challenge immediately captured our attention: a remotely controlled miniature model of a rails barrier.The goal of the challenge was to

CS Blockchains: Are They Really Secure?

The good, the bad and the blockchain: what this new technology means for cybersecurity There tend to be two vocal camps when a new technology emerges. First you have the people who embrace it wholeheartedly, immediately recognizing and espousing the benefits of whatever innovation has burst onto the scene. They can’t start using it fast

Skip to content