cybercriminal

tech threats

The Internet’s Scary Future: Tomorrow’s Tech Poses Bigger Threats

While the internet has undoubtedly brought new benefits, it’s also brought new problems as cyber criminals look to exploit our ever-growing reliance on connectivity. Phishing emails, malware and ransom...

types-of-malware

Types Of Malware And How To Prevent Them

Malware is a broad term for any type of malicious software designed to damage or exploit a device, service or network. Cyber criminals use malware to gain remote control over victims’ devices, spy on user...

Romance Scam_

Common Tactics Cyber Criminals Use To Lure You Into Their Trap

If you were one of the millions of people who watched Netflix’s The Tinder Swindler, you may have shaken your head in wonder at how women could be allegedly hoodwinked out of millions of dollars.&nbs...

Stop Doing These 10 Things That Give Hackers Easy Access

Stop Doing These 10 Things That Give Hackers Easy Access

Cyber attackers regularly exploit unpatched software vulnerabilities, but they continuously target security misconfigurations to gain initial access into victims systems. The US Cybersecurity and Infrastructure...

cyber sec

Boost Your Cybersecurity! 10 Steps To Improve Your Defences Now

Cybersecurity is the state or process of protecting and recovering computer systems, networks, devices, and programs from any type of cyber attack. Cyber attacks are an increasingly sophisticated and ...

ransomware

Ransomware: These Three Industries Have Been The Most Common Target For Attacks But No One Is Safe

According to analysis by cybersecurity researchers, over half of ransomware attacks are targeting one of three industries; banking, utilities and retail but they’ve warned that all industries are at risk ...

Happy birthday, computer viruses!

Creeper, the world’s first computer virus, was created in 1971.  Twenty years later, there were still only about 1300 viruses around the ‘net.  Today, forty years after Creeper, there are over 200 m...