security
Getting your data encrypted and not knowing the password bad enough. Now imagine that hackers who encrypted your data also went online and attempted to make a buck or two on your intellectual property, by setting up an auction site. Feeling upset? It can get worse. What if you were...
security
If you ever wanted to start your own alternative-tech company, the first quarter this year presents a truly unique opportunity: millions of netizens are looking for alternative platforms. Even though the subject of alt-tech has been floating around for quite some time, it wasn’t until January 2021 that the topic...
Guide
When it comes to computing, the concept of “logging in” has been around since approximately 1961, when in the days of boxy mainframe computers, a clever engineer came up with the idea of password-protecting the machine by issuing a login prompt. The first operating system to utilize this function was...
security
Whaling – phishing attack aimed at top managers and C-level executives CEO Fraud – a social engineering attack in which the attacker impersonates a C-level executive When someone thinks of a phishing attack, chances are they’re envisioning a simple, poorly-written message, littered with spelling and grammatical errors. Oftentimes this message...
security
Ransomware – type of malware which threatens to publish the victim’s data online or prevents the user from accessing their files without paying a ransom. Most commonly utilizes file encryption methods to achieve its goals. Ransomware – a threat to companies Ransomware is a lucrative business. Once the malware is...
news
This July will go down as a really bad month in Twitter’s history. Personalities and prominent public figures such as Barack Obama, Joe Biden, Jeff Bezos and Elon Musk – to name a few – got their Twitter accounts compromised. The cybercriminals didn’t spare corporations either: Apple and Uber’s accounts...
Guide
It’s safe to say that BYOD (Bring Your Own Device) trend has never really caught on. Back in early 2010s numerous tech-oriented news outlets expected somewhat of a ‘how-we-conduct-business revolution’, but in reality, very few businesses actually embraced the model of employees using their personal devices for work purposes. Perhaps...
Guide
Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured...
Guide
The 2013 Edward Snowden publicly confirmed something, which many of the IT experts were suspecting for years: the fact that an average computer makes for an excellent tool for spying on us. The media storm ensued. Soon afterward, a flurry of privacy-oriented products and services popped up, as the society,...