Search Results for
ransomware
How do hackers pick their targets?
In this post we take a look how easily hackers find information about there victims and how to avoid becoming an easy target.
The cost of cybercrime: $45 billion
The Online Trust Alliance published its report 2018 Cyber Incident & Breach Trends Report, in which it calculates the costs of cybercrime of the last year.
XENOTIME: the APT threatening critical infrastructure
XENOTIME, an APT that attacks critical infrastructure, has stated to probe the networks of electric utility companies in the United States and Asia-Pacific.
BlueKeep: cybercriminals scanning for the latest Windows vulnerability
A threat intelligence company has announced that it has started to detect scans looking for Windows systems with the BlueKeep vulnerability.
Get ahead of Windows vulnerabilities with Patch Management
A new vulnerability has been discovered in Windows, affecting users of Windows XP, Windows 7, and other older Windows systems.
Was Amazon’s Jeff Bezos Hacked?
Bezos’ security chief wrote an article in The Daily Beast this week asserting that Bezos’ phone had been compromised by the Saudis, possibly in collusion with Enquirer publisher American Media Inc.
TEMPEST and EMSEC: Is it possible to use electromagnetic waves in cyberattacks?
TEMPEST is a code name that refers to research and studies about unintentional emanations from electronic devices that can leak classified information.