Author Details

Malware

Malware Uses Cryptojacking, Cryptomining With Ransomware

Ransomware has been a major headache over the recent years. Cybercriminals are currently re-looking at this malware family to concentrate on...

Read More
Hacks

MEGA Chrome Extension Compromised To Steal Cryptocurrency

Hackers who compromised the Google Chrome extension for the popular file upload and sharing service MEGA used the same...

Read More
Why Organizations Should Help Law Enforcement Agencies in Fighting Cybercrime
Cyber Crime

Organizations should Work With Agencies to Curb Cyber Crime

Organizations should, in addition to preventing or combating cyberattacks themselves, also provide assistance to law enforcement agencies in combating...

Read More
United States Companies and the Cyber Attack Aftermath
Data Protection

United States Companies and the Cyber Attack Aftermath

The United States has been the favorite target of cyber attacks; this is due to Fortune 500 companies and...

Read More
How Enterprises Can Combat Cybersecurity Challenges On The Cloud
cybersecurity

How Enterprises Can Combat Cybersecurity Challenges On The Cloud

This is the age of cloud technology; we depend a lot on the cloud, for computing, for storage, for...

Read More
Managed Service Providers in the Era of Ransomware
Ransomware

Managed Service Providers in the Era of Ransomware

We are living in the post-WannaCry era, last year, the said ransomware has caused an estimated $4 billion worth...

Read More
Human Error The Reason behind 88 of all UK Data Breaches
GDPR

Human Error: The Reason behind 88% of all UK Data Breaches

Cybersecurity news media are very active with these days, telling the story of doom and gloom everywhere. However, there...

Read More
Firefox to Offer Users Automatic Protection Against Cryptocurrency Mining Malware
Malware

Firefox to Offer Users Automatic Protection Against Cryptocurrency Mining Malware

Mozilla Firefox would very soon have a new version that would be equipped to block cryptocurrency mining malware scripts....

Read More
The 5 Key Steps to Avoid Malware
Malware

The 5-Key Steps to Avoid Malware 

The virtual world, where people live online is marred by privacy violation, and how we hear the stories of...

Read More
How to Know If Someone Is Stealing your Wi Fi
Internet & Network

How to Know If Someone Is Stealing your Wi-Fi

The Internet has come a long way since its inception not restricted to those elite researchers and university proprietary....

Read More

Page 56 of 96

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register