Encryption

Data Encryption

Best Encryption Software 2022: Protect Your Data

In todays world data breaches happen on a daily basis, involving everything from device theft to vulnerability exploitation and open AWS buckets exposed for the world to see. Businesses and home users alike mus...

US Government Bitcoin Ransomware Attack

More than 20 municipalities in the US have been hit by ransomware attacks this year alone, the software has grown rapidly by an internet worm that spreads copies of itself by hacking into other computers on a n...

Significant Security Flaws

Big name companies have made public this week some major security flaws in their devices. While it is not uncommon for companies to disclose information on potential vulnerabilities, this week the sheer number ...

Keep Conversations Private with End-to-End Encryption Messaging

Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Reg...

Pegasus Spyware Detected – Upgrade to iOS 9.3.5 ASAP

Malware that spies on user phone calls and text messages, has been alleviated thanks to the latest iOS mobile operating system upgrade, and the wise proceedings of a human rights activist. Canadian cyber securi...

Why You Need to Deploy Encryption and How

Encryption is the transformation of data from plain text to ciphertext. In other words, basically taking data that is easy to read and placing it into a riddle that has no rhyme or pattern so that only those th...

How to scrub data from your device

You may be surprised to hear that “Delete” is not an end all function for wiping data clean from your machine. To ensure you data doesn’t get into the wrong hands, perform a secure erase. Whet...

3,500 Chimera decryption keys posted on pastebin

  Cybersecurity firm Sophos reported the authors of Mischa ransomware program gained access to the development platform of a rival program called Chimera this week, and posted thousands of Chimera decrypti...

Webcam Malware aimed at company employees

Attacks face many working employees as the newest form of malware has been aimed at webcams in the workplace. The new malware is used to record employee’s private moment sin order to extort information ou...

5 Ways to Spy a Hacker in Your Network

1. Search for the telltale signs of a breach.  Port Scans? Excessive failed log-ins? When a hacker infiltrates an unfamiliar network they need to learn the topology of the network, looking for vulnerable points...