Security & Privacy

May 3, 2021

Think Twice Before You Buy That Cheap Charger

In online marketplaces, it is easy to shop for the best deal. However, buying the cheapest charger for your smartphone is risky. Here’s why.
April 29, 2021

Microsoft Announces SolarWinds Hackers Have Downloaded Its Source Code

The hackers who used SolarWinds software to conduct a cyber attack against the U.S. federal supply chain in 2020 also gained access to Microsoft’s internal network. […]
April 22, 2021

Everything You Need to Know about the Conti Ransomware Gang

Conti ransomware first appeared in May 2020 and has become increasingly sophisticated since then, according to Cybereason. Attacks by this malware are particularly damaging due to […]
April 15, 2021

A Glimpse into a Trucking Company’s Ransomware Nightmare

A manager at a trucking company shares what it was like to be the victim of a ransomware attack. Here is his story and the lessons […]
April 12, 2021

PDF Viewers are Susceptible to these Attacks

The vast majority of PDF viewers are vulnerable to a variety of attacks, according to researchers at Ruhr University Bochum in Germany in a 2021 study. […]
April 5, 2021

DreamBus Botnet Infiltrating Enterprise Applications on Linux Servers

At its core, a botnet is a network of computers that have been hijacked from their users and infected with malware. The hackers can remotely control […]
March 29, 2021

DDoS Attacks Take over Computer to Mine Cryptocurrency

Countless people have become fascinated with the current values of cryptocurrencies, like Bitcoin. With popularity comes security vulnerability and hackers looking to take advantage of unsuspecting […]
March 25, 2021

5 Tips to Make your Passwords More Secure

An organization’s infrastructure is only as secure as the passwords protecting it. Poor password practices make it easy for hackers to access sensitive information, which is […]
March 22, 2021

3 Security Threats That Will Affect Many Businesses in 2021

There are numerous security threats that companies might encounter, making it difficult to decide which ones to address first. Here are three threats that deserve attention […]