Security Tips

Maze ransomware – threatens to leak stolen data. Protective measures.

Got infected by the Maze ransomware? To pay or not to pay the ransom? Is this the ultimate decision in…

4 years ago

What to do when you receive an extortion email

The extortion email is not a new concept, but the frequency is increasing in the current lockdown scenario. As a…

4 years ago

Ransomware Gang Launches Website to Auction Stolen Data

The Sondinokini Ransomware Gang has gone an extra step ahead and launched an auction stolen data website. The gang is…

4 years ago

Tech support scams: How to spot them and protect yourself

Tech support scams are another avenue that cyber-criminals are approaching to gain profit. It majorly targets fooling users into paying…

4 years ago

Beware of Wiper Malware! How to stay protected.

The destructive nature of Wiper Malware differentiates it from the other members of the family. Rather than aiming at ransom,…

4 years ago

What is GandCrab ransomware? Description and protection against it

GandCrab ransomware belongs to the family of Ransomware and keeps coming back in a refined version. First discovered in January…

4 years ago

What is a Brute Force Attack? Occurrence and Prevention Measures.

A Brute Force Attack is a cryptographic hack that is based on a password cracking method. It works on a…

4 years ago

WannaCry Ransomeware: The Most Prevalent Ransomware Strain

The WannaCry cryptoworm belongs to the family of ransomware and is known to be one of the 'deadliest' ones that…

4 years ago

Top 5 most dangerous cyber-attacks

Over the last few decades, dangerous cyber-attacks have gained a lot of attention and have become a major area of…

4 years ago

What is an Insider Threat? Signs and Prevention

An Insider Threat takes place when someone from within the organization or close to it uses its sensitive information in…

4 years ago