A Fresh Look at Malware and Mobile Threat Prevention
It goes without saying that in IT security, there’s an ever-looming threat of malware. Threats…
GDPR and our Path to GDPR compliance
[su_dropcap style="flat" size="5"]W[/su_dropcap]e manage so many of our daily activities online that the web has…
How to protect yourself from network attacks
[su_dropcap style="flat" size="5"]B[/su_dropcap]usinesses and governments have been urged to keep their network security up to…
Some HP laptops are hiding a deactivated keylogger
Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP…
Here is How Businesses Should Respond to the Ransomware Surge
Modern endpoint security tools and incident response plans will be key in the fight against…
What is Petya/ Petrwrap ?
Petya is a type of ransomware that appeared in early 2016 and returned to a…
New Malware that utilizes 7 NSA Hacking Tools: WannaCry Used 2
A security researcher has identified a new strain of malware that also spreads itself by…
How a domain registration suspended infection — but why it is probably not over yet
Interestingly enough, a researcher going by name Malwaretech managed to suspend infection by registering a…
The WannaCry-ransomware cyber-attacks
The WannaCry ransomware attack (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) is an ongoing cyber-attack of…
Here are ways companies get hacked!
Hacking is often called the biggest danger to the economic security and financial technology. It…