Background Ransomware isn’t a new phenomenon. The concept of holding locked files for ransom has been around since the era of the floppy disks. However, many will be surprised to find out that [...]
What is a blended attack? Depending on the context, a blended attack can refer to two different things. Generally speaking, a blended attack refers to the idea of using mixed techniques to invade [...]
This past weekend hit the world like a pile of bricks as nearly 100 countries were hit with the ransomware, WanaCry (or WannaCry, as many are prone to calling it). This malicious ransomware, like [...]
While the word “cloud” has been growing in popularity and the “IT-trend” in virtual circles everywhere, the past couple of weeks have been a tough one for the Cloud. The term “Cloudbleed” has [...]
While phishing and pharming did not gain momentum until the mid-2000’s, they have been a force to be reckoned with since they first made waves on the Internet. According to a case study by Wombat [...]
“XSS” is an acronym you hear often in the field of information security as it’s a common attack found in web applications affecting both the client and the server. And while acronyms can fool you [...]
Political parties and figures, international banks, and big hosting corporations were not the only ones subject to cyber attacks this past year. Hackers also set their eyes on the gaming and [...]
Zero-day attack, as cool as it may sound, is one of the most harmful web attacks because it is invisible. It consists of exploiting a vulnerability of a software that its developers aren’t aware [...]
SQL (Structured Query Language) is a programming language used to create and maintain databases. Its easy syntax and cheap implementation make it one of the most popular tools among programmers. [...]
Previously, we discussed the different industries that are targeted for DDoS attacks. Below, we’ll begin by pointing out some interesting industry facts and then look at some [...]