Estimated reading time: 3 minutes
In 2016, according to a report by a security training company (wombat security), 86% of the companies reported being a victim of phishing attacks. As many as 67% companies were the target of spear phishing. Phishing attacks cause severe damage to...Estimated reading time: 3 minutes
Hackers are continuously innovating new ways of cyber-attacks. The malware are getting commercialized and attackers can launch spam and DDOS attacks at will. Many attackers modify their already discovered ‘malicious products’ (the malware) to keep ahead of anti-malware industry and security professionals. As...Estimated reading time: 3 minutes
Over the last few years, the Governments of many countries around the world have become sensitive towards inadequate protection of consumer data by the companies. Many of them have enacted various laws and regulations to protect this sensitive data. The late 1990s...Estimated reading time: 3 minutes
Cyber-crime, with sophisticated methods, has become a multi billion dollar industry. Cyber-crime has evolved to data breaches and online identity theft using highly technical methods such as network eavesdropping. The definition of most expensive attack or which one is most damaging varies according...