Category: Other

cyber-attack

The Biggest Cyber Crimes in Our Recent History

What Is a Cyber-Attack? A cyber-attack is an attempt by hackers to damage or destroy a computer network or system. It is a deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyber-attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes, ...

Results Show Horrific Lack of Malware Knowledge!

Many of us have probably heard the word malware many times. And many of us believe we are educated enough not to fall victim to malware. However, recent studies showed that not only non-professionals but professionals as well are often not able to recognize the malicious tricks of latest threats. Disturbing Results Recent surveys showed ...

Antivirüs ve Anti-malware arasındaki fark (Hangisini kurmalıyım?)

Uzun lafın kısası: İkisine de ihtiyacınız var! Ne, Nasıl yani? Sakin olun, açıklıyoruz. Antivirüs ve anti-malware arasındaki fark nedir? Çoğunuz antivirüs ve anti-malware kelimelerini sıkça duymuşsunuzdur. Hele ki son günlerde yayılan WannaCry fidyeci zararlısıyla daha sık duyar oldunuz (Fidyeci zararlılarından kurtulmanın yoluna buradan ulaşabilirsiniz). Muhtemelen bu kavram kargaşasında kaybolmuş, anti virüs ve anti-malware arasında fark ...

Difference Between Antivirus and Antimalware (Here Is What To Install)

Do I need an antimalware or an antivirus? Straightforward answer: You need them all! Wait, what?! Ok, let’s elaborate it. What Is The Difference Between Antivirus and Antimalware? Many of you have probably heard words Anti-malware and Antivirus thousands of times, especially in recent period due to unfortunate WannaCry ransomware attacks (check here how to ...

trust in technology

Are constant data breaches making people lose trust in technology?

“In today’s digital business environment, trust is built on two major components: ethics and security. Trust is the cornerstone of the digital economy.” – Accenture Technology. The Internet Society (ISOC), expressed a concern that constant data breaches are seriously affecting people’s trust in technology. Digital trust is actually not a process but rather a result of ...

rootkit

What are bootkits and rootkits and why are they so scary?

While it’s hip and trendy to write and talk about ransomware variants, we should also not forget to spread the word on malware that is located deep into a machine’s boot process or firmware and which can get unrestricted access to the entire computer. The ones that keep malware analyst bump their head on the ...

healthcare breaches

Healthcare breaches: easy profit plus+lack of security protection

2015 was “the year of the healthcare breaches”-according to IBM, 2016 Cyber Security Index. During the last year, 47% of the United states population experienced a personal healthcare data breach. Out of the 16 critical infrastructure sectors, the Healthcare industry suffered from the most recent data healthcare breaches, an estimated ~21% – according to Gemalto’s ...