In our first part of this series, we provided a few scenarios of your system not working the way it should and how it could be a symptom of a malware infection. Unfortunately, if you thought those were the...
A malware infection can lead to a major drop in productivity. Whether it’s on an office system or on a personal one, these infections can lead to everyday work grinding down to a halt and at worse, a complete...
While almost all industries and sectors are at the risk of cyber threats, the effects on these threats on certain sectors can be disastrous. One of these sectors is healthcare. A cyber attack on a healthcare system can be...
Another year is here. 2019 has just started and it is likely to shape up to be an eventful year for cybersecurity. Last year, in our 2018 predictions, we analyzed the year ahead and shortlisted various cybersecurity trends which...
Close to 3 billion. No, that’s not the population of a country. According to a recent estimate, that will be the total number of users globally on social media. The popularity of this phenomenon called social media can aptly...
Emotet Known for constantly changing its payload and infection vectors like spam mail, Malicious Doc and even Malicious JS files. It compromised a very high number of websites on the internet. Emotet malware campaign has existed since 2014. It comes...
There’s an increasing threat to mobile devices all over the world and it’s not difficult to wonder why. The number of those small mini-computers we carry around in our pockets has literally just exploded – an estimate observed that...
You walk up to your car and the door opens on its own. You don’t need to turn the ignition – the car has already recognized you. You stop at a shop and pick out some breakfast. For payment,...
The cornerstone of a democracy is voting. For any successful democracy to function properly, it is important to ensure that its people’s representatives are chosen fairly and justly. The obvious take-away then is that if voting as an exercise...
Brute-force attacks can probably be regarded as the first word in the alphabet of cybersecurity. Among the oldest ways of trying to gain unauthorized access to an account, brute-force attacks have been around forever. But the fact that despite...