Tag "Hackers"

Back to homepage
IT Compliance

Why the cyber threat landscape could grow under GDPR

The General Data Protection Regulation (GDPR) is only 3 short months away, with the incoming regulation seeing businesses across Europe and beyond bolster their cyber security in an effort to

Hardware/Network

What online attacks will dominate the threat landscape this year?

This article will focus on three different and pressing issues that the IT security industry needs to be prepared for during 2018 – the increase of cyber threats via social

Software

Love letters from a Black Hat to all the fools on the Internet

As an underground, “black hat” hacker, I don’t have time for significant others. I’m too busy earning stacks of cash to improve my Bitcoin mining rigs and working to pay

Identity Theft

UK government websites infected by cryptocurrency miners

Hackers injected malicious code into a plug-in for the blind in order to mine for the cryptocurrency Monero.In an attempt to mine cryptocurrency, hackers have injected malicious code into a

Software

What is cryptojacking? How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that

Software

Is Investing in Cryptocurrency Worth the Security Threats?

Even people who aren’t familiar with investing have heard of cryptocurrency — especially lately since it has frequently made headlines.Some of those news stories about digital currencies focus on the

Software

The cyber threat hunting game has changed

Threat hunting has evolved into a modern day sport, as cybersecurity companies scour the Dark Web to be the first to define a new vulnerability, type of malware or attack

Software

9 Tips to Prevent WordPress Hacks in this Dangerous Digital World

WordPress hacks are increasingly common. Whether it’s for malicious reasons, to harm a site or to just insert backlinks, WordPress can be very vulnerable if not cared for and updated

Cloud

Microsoft & Google unable to detect new zero-day ransomware

The ShurL0ckr ransomware was able to avoid detection by a majority of anti-virus engines and cloud applications.As organisations have adopted cloud services to increase their productivity and agility, so to

Industry Insights

Enterprises spend more than $16 million on hidden costs of detection

Most organizations employ some kind of detection-based security to protect their systems. But a new report by cyber security company Bromium reveals that this approach has major hidden costs.Upfront licensing