The COVID-19 pandemic has hit just about every country and cybercriminals have taken full advantage of its crippling effects. The sheer volume of increased cyberattacks has exposed the vulnerability of individuals, businesses, and governments. Scam e-mails from what appear to be valid sources such as the World Health Organization or government health websites have opened […]
It should first be stated that misinformation and published propaganda isn’t new. In the past, those that wanted to spread what is now called “fake news” made use of the methods of the time: publications and radio. Laws in some countries made it difficult to extend false stories in the news media, but this completely […]
If you have been hearing a lot about topics such as cryptocurrency and blockchain, you might have wondered what they are, what is the purpose, and whether or not blockchain is secure?
IT managers need to take a good hard look at their existing enterprise systems as well. A majority may have well-planned and designed security controls, but many also have older legacy systems somewhere in their networ
Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas. […]