486 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Mobile News
Ransomware gang LockBit launches ransomware with bug bounty program
Their new ransomware spreads through a fake copyright infringement email. And just like big companies, they have included a bug bounty program.
Deep fakes โ a threat to truth online?
Face swapping technology is good fun โ until the technology is used for evil.
DOJ Dismantles Major Russian Botnet Responsible for Hacking Millions of Connected Devices
The hackers were selling access to compromised devices without the ownerโs knowledge. The devices and IPs were used for malicious purposes.
Travel tips and how to stay safe while on the go this summer
Stay safely connected while on holiday! Here are our top tips for you.
Would you watch TV on the road?
The UK government has confirmed plans to allow self-driving car owners to watch TV behind the wheel.
Can iPhone be hacked when turned off?
Some of the phone’s component remain on, giving bad actors an opening to introduce malware into the device.
How are hackers targeting your network through mobile devices?
We take a look at four ways mobile devices may be used by cybercriminals to break into a network.