Cytegic continuously monitors the cyber threat landscape and analyzes various inputs to identify threat agents, attacks and controls, based on geo-political regions and business sectors. Our DyTA machine monitors thousands of quality sources (both structured and unstructured), detects daily, weekly and monthly trends, changes and events and incorporates them into Cytegic’s methodology and systems. DyTA
Monthly Archives: December 2014
In recent years, it has become a known fact, that if a country or its government performs actions which may be perceived as ‘provocative’, it automatically becomes a viable target for hackers, and specifically Hacktivists. Cyber-reactions have become the norm when it comes to military operations, campaigns and even tensions between countries – for example,
Here’s our end of November Intelligence update. Don’t forget to tune in a month from now for our 2014 summary and 2015 assessment (alongside a few other surprises…). In the past month, Cytegic’s CIAC has observed the following events and developments which are either indicators of trends, independent significant issues, or are important enough to
My grandma will turn 90 in several months. She never owned a computer, and I’m pretty sure she doesn’t know how use one. Her mobile phone has actual keys and is anything but smart. Yet this holiday season she too can become a target for cyber criminals. How’s that? Very simple- she owns a credit card.