Until now, ransomware cyberattacks used to follow a simple pattern: infection, encryption, ransom payment. In recent years, access to such malware has become very easy, the idea of accessing a program as a service being more common, marketed on dedicated forums, both on the dark web and on the
Israel had seven cybersecurity unicorns in the first half of 2021, and one in three of the world’s unicorns in the field is Israeli. This is the result of ten years of efforts that started with the drafting of a national strategy that saw government supporting initiative and investment in this
In its many years of being the leading app for fast and simple online chat, WhatsApp has been through a lot, including a privacy policy that has sparked some concern. The Facebook-owned platform boasts end-to-end encrypted messaging that provides users with increased security. However, a recent
The smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would be the Amazon Echo smart speaker. A recently published study
Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright.
As much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were and still are also at