Watch out! The risks associated with BGP, FTP, and NTP protocols
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
A dating site and corporate cyber-security lessons to be learned
Analysts were able to draw some important conclusions from Ashley Madison that should be taken into account by any company that stores sensitive information. Protect your company!
The Largest Facebook Hack Happened Last Week
The most massive hack in Facebook’s history happened last week. A Facebook code vulnerability caused the data breach.
3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
10 Secure File Sharing Options and Tips
In the current world of technology, pictures, documents and files are no longer shared in the physical form. Most are transferred through online tools. While…
The consequences of not applying patches
Many recent cyberincidents in have shared one characteristic: they have been possible thanks to a vulnerability in an IT system that needed patches.
Intelligent Fake News Detection Becomes A Reality
The fight against fake news just became a lot smarter thanks to artificial intelligence