Detrimental Ransomware Effects
Lost coursework and headaches By Charles Parker, II Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828 students, aged between 11…
The ways of responding to a terrorist encryption
By Milica D. Djekic The encryption may get a crucially significant point in some communication or information exchange activities. It’s not only important to a Defense Force as it may…
Improving Quality And Security With Binary Analysis
By Bill Graham, Technical Marketing Consultant, GrammaTech Introduction: Companies serious about quality, safety, and security need to manage the risks in their supply chain, including software such as commercial of…
How Can You Tell If Your WordPress Site Has Been Hacked?
WordPress is the foundation of a large chunk of the web, which makes it an obvious target for criminals and hackers. If attackers find a vulnerability in WordPress, they have…
Lock, stock and two smoking … access controls
By Milica D. Djekic The point of this article would not be to deal with some of London’s gangs, but rather to present what the access control is and why…
Understanding Bluetooth and its role in the Internet of Things
By Dimitri Vlachos, VP of Marketing, Pwnie Express Bluetooth technology was originally designed for continuous, streaming data applications – essentially, it was intended to replace wires to create the possibility…
E-Recycling: Exploring the “End-of-Life” Issues for Connected Devices
A brief digest from the E-Scrap Conference & Trade Show 2019 Orlando, FL – What happens to our beloved tech devices when they die? Wouldn’t it be great if the…
Best Practices for Remote and Branch Office Data Protection
By Gregg Petersen, Regional Director, Middle East, and SAARC, Veeam Software We’ve all heard about fantastic new data center technologies, but all too often it looks like these technologies only…
How a Cyber Attack Could Kill Your Website – Permanently
By Phillip Adcock, Managing Director, Shopping Behaviour Xplained Ltd Shopping online has become the standard way to do things. But with many shoppers wary of online services, site owners should…
How to investigate a cyber crime scene?
By Milica D. Djekic The crime may appear anywhere – even in cyberspace. It’s simply a social phenomenon that would include people to deal in an inappropriate manner. So, as…
Business Risk Intelligence: A Necessity Across the Enterprise
By Josh Lefkowitz, CEO at Flashpoint While the Deep & Dark Web has yielded important security considerations for some time, it’s really been in the last 18 months that the…
Speculative Execution and SWAPGS
A Match Made In Heaven for Motivated Threat Actors By Filip Truta, Information Security Analyst, Bitdefender What if cybercriminals could deploy an attack that is both devastating and impossible to…