In todays world data breaches happen on a daily basis, involving everything from device theft to vulnerability exploitation and open AWS buckets exposed for the world to see. Businesses and home users alike mus...
More than 20 municipalities in the US have been hit by ransomware attacks this year alone, the software has grown rapidly by an internet worm that spreads copies of itself by hacking into other computers on a n...
Big name companies have made public this week some major security flaws in their devices. While it is not uncommon for companies to disclose information on potential vulnerabilities, this week the sheer number ...
Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Reg...
Encryption is the transformation of data from plain text to ciphertext. In other words, basically taking data that is easy to read and placing it into a riddle that has no rhyme or pattern so that only those th...
You may be surprised to hear that “Delete” is not an end all function for wiping data clean from your machine. To ensure you data doesn’t get into the wrong hands, perform a secure erase. Whet...
Cybersecurity firm Sophos reported the authors of Mischa ransomware program gained access to the development platform of a rival program called Chimera this week, and posted thousands of Chimera decrypti...
Attacks face many working employees as the newest form of malware has been aimed at webcams in the workplace. The new malware is used to record employee’s private moment sin order to extort information ou...
1. Search for the telltale signs of a breach. Port Scans? Excessive failed log-ins? When a hacker infiltrates an unfamiliar network they need to learn the topology of the network, looking for vulnerable points...