Fax Capable Printers an Attack Prospect for Malware Payload

Fax Capable-Printers, an Attack Prospect for Malware Payload

The fax machine in the eyes of the millennial generation is what is the Walkman, cd player and cassette tapes are today, a relic of the forgettable past. However, some…

Read More
PGA Championship the Newest Victim of Ransomware Attack

PGA Championship, the Newest Victim of Ransomware Attack

Ransomware strikes again, this time not against its perennial favorite target, the healthcare industry, but PGA TOUR servers. The ransomware attack happened two days before the start of the PGA…

Read More
Open EDR
Apple released patches to address vulnerabilities in the High Sierra

The Small, Medium-Sized Enterprise vs Cyberthreats

“Small and medium-scale enterprises created jobs and strengthened support industries in domestic economies. While foreign direct investment from developed countries and the transfer of technology could aid the small and…

Read More
Millennial Generation in the era of Cybersecurity Failures

Millennial Generation in the era of Cybersecurity Failures

The millennial generation has already started becoming an influential force in the workforce, hot on the heels of Generation X which it immediately succeeds. Millennials are people born from 1981…

Read More
Cybersecurity Experts Feel That Iranian Hackers are Developing Ransomware to Secure Bitcoin

Iranian Hackers are Developing Ransomware to Secure Bitcoin

Cybersecurity experts have come up with the warning that Iranian Hackers, in the face of the economic issues that the country is likely to face, have started developing ransomware that…

Read More
SamSam Ransomware

SamSam Ransomware Continues to Victimize Large Cities

Samsam ransomware has made a name for itself. It is now considered as a spiritual successor of the nasty WannaCry ransomware of 2017. It is very effective in forcing the…

Read More
Russian Hackers Reportedly Use Kaspersky Software to Steal U.S Cyber Secrets from NSA

How Businesses Can Prevent Software Vulnerabilities

In a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at least one software vulnerability to 84% of all…

Read More
Why Penetration Testing is Important

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the…

Read More
Inside SamSam Ransomware’s 6 Million Ransom Profit

Inside SamSam Ransomware’s $6 Million Ransom Profit

Ransomware is a big business for cybercriminals. In the age when the market is flooded by many competing cloud-storage and cloud-backup services, a significant number of them are even free…

Read More
Cybersecurity Industry’s Negligence with Securing the SME Business Sector

Did The Cybersecurity World Forget Small To Medium Businesses?

Officials at the Australian Small Business and Family Enterprise (ASBFE) recently released a small business statistical report detailing the pattern and health of Australia’s small-to-medium enterprise (SME) sector—and it’s not good…

Read More

Page 23 of 28

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register