New Spyware Law in Germany Poses Threat for Press FreedomThis June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in... BLOG Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
New Spyware Law in Germany Poses Threat for Press FreedomThis June, German lawmakers approved legislation that would hand security forces the power to use spyware. The security agencies in...
BLOG Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,... Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development... Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States... Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
Digital Security vs. Digital Privacy June 10, 2020 Due to the lack of uniformly recognized standards, many SME customers will be confused by some security professional terms. They...
10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the...
Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which...
Fake Apps Used As Surveillance May 1, 2020 Cybercriminals are increasingly touting decoy versions of popular applications that include surveillance software, such as Skype and Signal. Apurva Kumar,...
Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Detroit Hospital Network Leaked More Than 100,000 Patient Accounts April 23, 2020 The digitization of medical care has become a megatrend in recent years. It can be presented by the growing development...
Unemployment Scams During the Outbreak of COVID-19 April 22, 2020 Japan has just declared a state of emergency across the country, and the number of unemployed in the United States...
Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate...
Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...