Editorial

WhatsApp and iMessage Give Large Amounts of User Data to the FBI: Leaked Document
Editorial WhatsApp and iMessage Give Large Amounts of User Data to the FBI: Leaked Document

Almost all instant messaging services on the market today make a big deal about their security and privacy policies. A recently leaked document has revealed just how much data the FBI can legally obtain from these services. The infographic shows details about iMessage, Line, Signal, Telegram,

How to Protect Your Business From Ransomware Attacks in 2022
Editorial How to Protect Your Business From Ransomware Attacks in 2022

Over the last couple of years, there has been a significant increase in the number of ransomware attacks impacting organizations of all industries and sizes. To define ransomware, it is a type of malware that ‘employs encryption to hold a victim’s information at ransom.’ This means that individuals

Protecting Critical Infrastructure in the Age of Ransomware
Editorial Protecting Critical Infrastructure in the Age of Ransomware

The recent increase in ransomware attacks has highlighted vulnerabilities in critical infrastructure and the ease of affecting component systems. As the paradigm shifts, important preemptive measures must be taken.  A New Generation of Critical Infrastructure A decade ago, critical infrastructure

Hidden Threats in Cloud Services: How Most Businesses Fail to Protect Sensitive Information Stored in Cloud
Editorial Hidden Threats in Cloud Services: How Most Businesses Fail to Protect Sensitive Information Stored in Cloud

Cloud computing’s mobility and ease of access makes it one of the most convenient choices for any modern organization. While using the cloud, though, companies are becoming more and more susceptible to security threats.  Most Companies Don’t Protect Their Sensitive Cloud Data Almost 40% of orga

Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021
Editorial Hackers Are Getting Smarter: How They Compromise Corporate Networks 3 Times Faster in 2021

Hackers have managed to compromise corporate networks three times faster in 2021, with 75% of attacks being financially motivated, a recent report shows. Both government and industry experts say greater complexity and interdependence among systems gives attackers more opportunities for widespread,

The Rise of Ransomware 2.0: New Methods of Extorting Victims
Editorial The Rise of Ransomware 2.0: New Methods of Extorting Victims

Until now, ransomware cyberattacks used to follow a simple pattern: infection, encryption, ransom payment. In recent years, access to such malware has become very easy, the idea of accessing a program as a service being more common, marketed on dedicated forums, both on the dark web and on the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later