Despite the importance of school security, computers on educational campuses are considered to have the weakest level of overall cybersecurity. In the case of public schools, corporations, social do-gooders, and…
Read MoreDespite the importance of school security, computers on educational campuses are considered to have the weakest level of overall cybersecurity. In the case of public schools, corporations, social do-gooders, and…
Read MoreSecurity researchers have recently discovered a cybergroup in China who are working on a new type of hacking campaign using the shipping and transport industry. The campaign is called “Special…
Read MoreAccording to a recent report, malware attacks have continued to accelerate in the first half of 2018, accompanied by dangerous ransomware which is back in full force. The 2018 SonicWall…
Read More“Failing to plan is planning to fail” – Benjamin Franklin In the world of IT, Franklin’s famous quote above still rings the bell. Sadly, there are still companies that are…
Read MoreSecurity researchers recently discovered a group of cybercriminals successfully spreading Trojan banking malware through the use of bogus Google Play applications. First detected in June by professionals at IBM X-Force, the…
Read MoreNot everyone is aware that email is one of the oldest technologies we still use today as one of the several services provided by the internet. The very first email…
Read MoreCybersecurity researchers have detected an unusual breed of malware that modifies shortcut files on desktops to secretly download backdoor programs. I a recent blog past, Loseway Lu, a researcher at Trend…
Read MoreBecause the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…
Read MoreRemember last year, Verizon released data breach investigation report that showed 80 percent of the hacking was related to stolen password. The cybercriminals used the victim’s password to gain access to their…
Read MoreTrojans, as we know, are malicious computers programs that infect devices/systems by mimicking genuine software and then going on to extract data from the system/device. Trojans that mimic banking applications…
Read More