malware-mobile-threat
A Fresh Look at Malware and Mobile Threat Prevention

It goes without saying that in IT security, there’s an ever-looming threat of malware. Threats…

GDPR and our Path to GDPR compliance

[su_dropcap style="flat" size="5"]W[/su_dropcap]e manage so many of our daily activities online that the web has…

network-security
How to protect yourself from network attacks

[su_dropcap style="flat" size="5"]B[/su_dropcap]usinesses and governments have been urged to keep their network security up to…

hp-keylogger
Some HP laptops are hiding a deactivated keylogger

Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP…

how-business-respond-to-ransomware
Here is How Businesses Should Respond to the Ransomware Surge

Modern endpoint security tools and incident response plans will be key in the fight against…

What is Petya/ Petrwrap ?

Petya is a type of ransomware that appeared in early 2016 and returned to a…

malware
New Malware that utilizes 7 NSA Hacking Tools: WannaCry Used 2

A security researcher has identified a new strain of malware that also spreads itself by…

Malware
How a domain registration suspended infection — but why it is probably not over yet

Interestingly enough, a researcher going by name Malwaretech managed to suspend infection by registering a…

wannacry-ransomware
The WannaCry-ransomware cyber-attacks

The WannaCry ransomware attack (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) is an ongoing cyber-attack of…

how-hacking-happens
Here are ways companies get hacked!

Hacking is often called the biggest danger to the economic security and financial technology. It…