What 2018 holds for us?

Cybersecurity Predictions for 2018

2017 was the year when it became clear that we need to take our online security seriously. Huge companies like Uber or Instagram fell victim to breaches and hacks. Not to mention the most significant breach of the year brought you by Equifax. Many are asking the question: what’s next? Going into the new year, we believe this is an important question …

So much data, so many leaks

Lessons Learned from 5 Biggest Data Breaches

New details about Equifax breach unveil every day. What could we learn from this and other recent data breaches? First and foremost: never stop updating your software and, more importantly, your knowledge. Hackers are doing their best to create sophisticated ways to gain access to personal data. We, in turn, should become a community that shares the knowledge and is …

CUJO Wins Again: Awarded by the Biggest Telcos and Trusted Partners

This weekend marked two exciting victories for CUJO. We were selected by  Deutsche Telekom, Orange, Singtel and Telefónica as one of the 5 companies that offer the most innovative consumer security solutions in the market. Also, we were named as the best home security system in international trade association conference CEDIA. Excited to form partnerships with world’s biggest telcos During the …

Equifax data breach considered to be one of the most serious data leaks so far

Equifax Data Breach: The Next Steps

Equifax has reported a data breach and it is already called the worst personal data leak in history. Not without a reason. With 143 million people affected, 44% of U.S. adult population is at risk. In fact, experts say that it’s safer to assume that you were affected and take security measures right away. What has happened so far? Mid-May – July. …

Hackers Can Change an Email after It’s Already in Your Inbox

This week, researchers have uncovered an email hack that allows hackers to modify emails once they are already in your inbox. What is it? Francisco Ribeiro, a researcher at Mimecast discovered this exploit and called it Ropemaker. The cryptic name stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky and takes advantage of CSS and HTML. This particular …