Uncategorized

Uncategorized 18 October, 2022    By - Jerry
Ransomware – The Biggest Cybersecurity Threat Today

Ransomware is a type of malware that encrypts a victims device entirely and then demands a monetary fee, or ransom, for the safe release of the data. During this time, the victim cannot access any of their files. Ransomware is a sophisticated type of virus, and will often laterally spread across a network, allowing it […]

Read More
Uncategorized 18 October, 2022    By - Jerry
The Dangers of Phishing

Phishing is perhaps the most well-known attack vector a hacker can utilize. Nearly everyone has seen a phishing attempt at some point in their lives. To put it simply, Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to […]

Read More
Uncategorized 18 October, 2022    By - Jerry
Zero Day Vulnerability: The Open Door For Hackers

A Zero Day Vulnerability is a term describing exploits that appear very early into the lifespan of a product, or early into an update. The word comes from the fact that many of these bugs are found on the first day of launch when the product/update has been public for zero days thus far. It […]

Read More
Uncategorized 18 October, 2022    By - Jerry
Handheld Hacks: The Rise Of Android Malware

Android malware isn’t something we consider every day, nor does it make the news as often as the big-scale corporate hacks we see on TV or read about online. Viruses are confined to our desktops and laptops, right? We oftentimes can look at the devices in our pockets and not see them for what they […]

Read More
Uncategorized 18 October, 2022    By - Jerry
Turning Devices Against Their Users: A Brief History Of Botnets

At its core, a Botnet is a network of hijacked host devices that are used in a number of illicit activities, chiefly cyberattacks. The word is a portmanteau of ‘robot’ and ‘network’. Botnets are primarily used to automate large scale attacks, or to distribute additional malware. Users are unaware if a device they own is […]

Read More
Uncategorized 19 October, 2022    By - Jerry
A Plague Against Privacy – A Deep Dive Into Spyware

A Deep Dive Into Spyware. Like many forms of malware, Spyware nests inside an infected device without a users knowledge. The primary goal of Spyware is to steal sensitive information and relay it back to some kind of server or service. This information could be anything – internet usage, what is typed on the device, […]

Read More
Uncategorized 20 October, 2022    By - Jerry
The Conti Ransomware Gang: A Retrospective

Conti Ransomware has been one of the most infamous strains of ransomware in recent years. The malware itself is expertly written and is able to encrypt data and spread to adjacent systems with speed previously unseen in the ransomware community. It was first observed in 2020, and is lead by a Russian-based cybercrime group simply […]

Read More
Uncategorized 20 December, 2022    By - Brad Hawkins
6 VPN Protocols: What Are They And How Are They Used?

  VPN Protocols are a key component to VPNs, Virtual Private Networks. VPNs are a tool that allows users to layer traffic among multiple networks within a secured encrypted tunnel, which gives a number of benefits. VPN Protocols are required to use VPNs, as they provide many key aspects of encryption and decryption. VPN Protocols […]

Read More
Uncategorized 17 January, 2023    By - Brad Hawkins
Does A VPN Protect You From Viruses While Online?

VPNs have become ubiquitous, but it’s important to look at how far their protection really goes. One of the most common questions when looking at this protection is “Does a VPN protect you from viruses while online?” Before we answer that question, its important to understand what a VPN is, how a VPN works. A […]

Read More
Uncategorized 10 February, 2023    By - Brad Hawkins
6 Reasons Why You Need A VPN For Cryptocurrency

Despite the popularity of cryptocurrency, many investors and traders don’t give a second thought to security – Which they pay for dearly. Today we look at the 6 reasons why you need a VPN for cryptocurrency. Cryptocurrency has been around for over a decade, but it’s fair to say that it only picked up spotlight […]

Read More