According to a survey that was conducted by The Identity Theft Resource Center, the number of data leakages has declined in the first half of 2020 and the number of victims has decreased by 66% [...]
This guide will discuss the steps you can take to retrieve your data from a ransomware attack successfully. If you have experienced such an attack, you will agree that ransomware is one of the [...]
If you’ve been following us on Facebook, you know that we started a series called “Hacker Insight” where we explore topics and tech terms most frequently used in the hacker community. Along with [...]
2017 was the year in which ransomware grabbed the attention of many. Petya, NotPetya, and WannaCry, in particular, are still fresh on our minds. But with eyes on the major headlines of the past [...]
The word “hacker” often has a negative connotation. Most of the time, the hackers we refer to or hear about are of the villainous variety, known as “blackhat” hackers. However, these [...]
Cyber incidents like the powerful Mirai botnet and the attack on DNS provider Dyn defined some of the biggest (cyber) moments back in 2016. The Dyn attack, for instance, disrupted internet [...]
Background Ransomware isn’t a new phenomenon. The concept of holding locked files for ransom has been around since the era of the floppy disks. However, many will be surprised to find out that [...]
This past weekend hit the world like a pile of bricks as nearly 100 countries were hit with the ransomware, WanaCry (or WannaCry, as many are prone to calling it). This malicious ransomware, like [...]
Lately we’ve been receiving a lot of questions about malware and how malware can be removed/avoided. In this short article, we’ll briefly touch on some subtopics about malware to help [...]