leakerlocker

Have you heard? There's a new type of malware that's threatening to send victims' private messages, pictures, and even their Internet browsing history to their immediate social circle (family members and friends). This threat is called LeakerLocker, and unfortunately, it...

Read More
Big data analytics

There are a lot of things to be concerned about when your company is working with big data. On top of the list of those things is no less than dealing with several aspects pertaining to cybersecurity. The presence of...

Read More
endpoint threats

Cyber criminals are often on the lookout for ways to steal sensitive information and compromise critical systems. Cyber attacks can come from a wide variety of web and email sources. These attacks aim to infect business endpoints. Recent research has...

Read More
eCommerce businesses

Small eCommerce businesses are vulnerable to malware and other various forms of cyber attacks. Oftentimes, small eCommerce business owners do not understand the importance of cyber security because they have the assumption that cyber criminals only launch attacks of major...

Read More
flaws in modern processors

Cyber security researchers have discovered two potentially serious exploits of modern processor vulnerabilities: The Meltdown exploit and the Spectre exploit. These exploits were designed to leave no traces in traditional log files and could capture encryption keys, passwords, and other...

Read More