Category: Other

What is spyware?

Spyware is a piece of software that aims to gather information about a person or an organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge. How does it work? While the term spyware suggests software that monitors ...

Dark Web

Dark Web and all you need to know about it

What is Dark Web? The Dark Web is a term that refers specifically to websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Websites on the so-called Dark Web hide their identity using the Tor encryption tool. Tor renders your IP address ...

GDPR-Zemana

GDPR and all you need to know about it

What is GDPR? GDPR stands for General Data Protection Regulation; it is going to regulate personal data of EU citizens, which means collecting or processing any information that we can use to identify a person. GDPR will enable: – strengthening the rights of individuals over their own data – making organizations accountable – ensuring equal protection ...

Cryptography

What is Cryptography?

Definition of Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography protects data from theft or alteration.   History ...

Man-in-the-middle attack

Often, we have conversations where there’s confidential information flow between two parties. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. In other words, man-in-the-middle attacks are a common ...

cyber-attack

The Biggest Cyber Crimes in Our Recent History

What is a cyber-attack?   A cyber-attack is an attempt by hackers to damage or destroy a computer network or system. It is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to ...

Results show horrific lack of malware knowledge!

Many of us have probably heard the word malware many times. And many of us believe we are educated enough not to fall victim to malware. However, recent studies showed that not only non-professionals but professionals as well are often not able to recognize the malicious tricks of latest threats. Disturbing results Recent surveys showed ...