In the year 2015, we saw how ransomware created havoc across the world inflicting some $350 million damage, and the trend followed in 2016 with $850. Last year it stood…
Read MoreIn the year 2015, we saw how ransomware created havoc across the world inflicting some $350 million damage, and the trend followed in 2016 with $850. Last year it stood…
Read MoreRansomware seems to be the trend in the world of cyber attacks.Some cyber security experts even call 2017 the year of ransomware attacks; they were so rampant and were discussed…
Read MoreThe U.S Department of Homeland Security, along with the FB, has come out with a statement that hackers who reportedly have ties with North Korea could still gain backdoor access…
Read MorePost the WannaCry outbreak, the term ransomware has become quite familiar, even to the layman. Today, it’s like ransomware here there and everywhere! It’s like every now and then we…
Read MoreJust when we all were thinking that Ransomware can be dealt with strict and tight security measures, here comes the latest in the news that Ransomware can kill your Android,…
Read MoreNHS (The National Audit Office) across the country were affected by the WannaCry ransomware in May because they needn’t apply the Windows 7 patches, which was available that time. Later…
Read MoreUK’s National Cyber Security Centre states that the WannaCry ransomware was the biggest test of the year. The NCSC (National Cyber Security Centre), which was founded last year, has made…
Read MoreThe IT Security Community is apparently not happy with the arrest of Marcus Hutchins, the British Hacker responsible for creating the kill switch for Wanncry Ransomware, over the alleged creation…
Read MoreThe digital world is suffering yet another malware attack. Hundreds of thousands of endpoints worldwide were attacked in May by the WannaCry ransomware. More recently, a malware called Judy has…
Read MoreA recent cyber-attack that crippled some of the world’s most critical computer networks might have originated in China. The ransomware attack infects a user’s computer via a malicious email—similar to…
Read More