Security & Privacy

March 1, 2021

AIR-FI – The New WiFi Hacking Method

The ubiquitous nature of Wi-Fi has certainly made our lives easier and more convenient in a lot of ways, it’s also undoubtedly made them more dangerous, […]
February 8, 2021

Ransomware Cybergangs Are Now Calling Their Victims

After successfully infecting companies’ IT networks with ransomware, some cybergangs are now calling those businesses to intimidate them into paying the ransom. Find out more about […]
January 4, 2021

How to Avoid Being Scammed While Shopping Online

Online shopping is becoming more popular — and so, too, are fraudulent websites designed to scam shoppers. Learn about the precautions you can take to avoid […]
December 28, 2020

3 Positive Business Takeaways in 2020

Although 2020 has been filled with many unfortunate events like the coronavirus pandemic, there have been some positive business developments. Here are three of them.
December 23, 2020

5 Notorious Cyberattacks That People Will Remember Long After 2020 Ends

The number of cyberattacks has increased significantly in 2020. Here are five notorious cyberattacks that many people will remember for years to come.
December 21, 2020

The History and Rise of Emotet

By far, one of the most dangerous strands of malware to come along has been Emotet – a rogue program that was first discovered in 2014. […]
December 17, 2020

The IoT Cybersecurity Improvement Act: What It Is and What You Need to Know

Also commonly referred to as the IoT for short, the Internet of Things is a term that refers to a massive, interconnected network of literally billions […]
November 30, 2020

What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]
November 23, 2020

NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]