Security

Is Spyrix malware? Everything you need to know about the keylogger: Header image
As the post-pandemic world continues to adopt remote and hybrid work models, employers are seeking ways to keep an eye on their staff when they aren’t physically present in the office. This can...
Aug 25, 2023
7 min read
What are botnet attacks? Everything you need to know about bot networks: Header image
Botnets have been around since the early days of the internet and remain one of the world’s most threatening cybersecurity issues. A cyber botnet has only one basic requirement: an internet connection. Once...
Aug 17, 2023
7 min read
What is NanoCore, and how does this malware work? Header image
Despite being created about ten years ago, NanoCore is one of the most popular, effective, and dangerous remote access trojans (RAT). But what exactly is NanoCore? Why is it still relevant? And what...
Aug 15, 2023
5 min read
What is Bad Rabbit? Understanding the 2017 ransomware attack (Header image)
The first ransomware attack was registered in 1989. Back then, attackers encrypted files and held them hostage in exchange for payment that had to be mailed to a P.O. box. It was not...
Aug 4, 2023
5 min read
How to get a secure Wi-Fi connection at home and in public (Header image)
The Wi-Fi icon has become a symbol of instant connectivity. But just as you can easily connect to wireless networks, so can hackers, as most Wi-Fi networks are open and unsecured. In this...
Jul 31, 2023
6 min read
The top 10 types of malware that can infect your Mac (Header image)
Apple defines malware as “malicious software, which includes viruses, worms, trojan horses, and other programs that can harm your Mac or your privacy.” And while experts still do not agree on the exact quantity...
Jul 25, 2023
6 min read
Hashing vs encryption vs encoding: The differences explained (Header image)
Our digital world runs on data. And data needs to be constantly formatted, verified, and secured. Every day, your data is encoded, encrypted, or hashed when you go online to write an email,...
Jul 17, 2023
5 min read
What is white hat hacking? Here's how ethical hacking works (Header image)
When most people hear the word “hacker,” they often think of the usual stereotype: an evil cybercriminal in a hoodie, hunched over a computer in a dark room. In a way, we have...
Jul 17, 2023
10 min read
Not all skills used by hackers and cybercriminals relate to computing. In fact, when coding gets a hacker nowhere, they turn to a classic technique used by scammers and con artists: social engineering....
Jul 17, 2023
8 min read
Red hat hacking: Understanding the vigilante hacker (Header image)
Hackers wear many “hats.” There’s black hat hacking, but there’s also white hat, green hat, blue hat, red hat, and others. Some do it for the money. Others seek to cause havoc and...
Jul 17, 2023
10 min read