Samsam Ransomware – Attack Strategy & Preventive Measures

In 2018 there has been a sudden increase in Samsam ransomware attacks. The virus first made an appearance targeting vulnerabilities in JBoss, hitting organizations in the education and healthcare sectors. Later it targeted single-factor external access such as RDP or VPN, as well as vulnerable FTP platforms, and Microsoft’s IIS. […]

Top 5 Website Security Myths Hackers Want You to Believe

Each passing day takes us to a new headline about the leakage of the most important information over the Web. Be it bank account details belonging to millions of users, passwords or even social media accounts- the world of cyber-hackers are continuously taking advantage of the lack of security in every possible way. They […]

Back to Basics: What are the Different Forms of Backup?

In today’s digital world, backing up your files is an important concern. Generally, most of our crucial data such as data files, projects, videos, etc. are all stored in only one place-Smart device. But do you know that gathering your important data in one place can be dangerous? Well, system crash, theft and accidental deletion of files are some of the ways that can make you lose the data which you have stored creating it for such a long time.

Different Types of Email Phishing Scams

Phishing needs no introduction. Tricking millions of internet users into giving up their sensitive information, phishing scams are one of the topmost cyber threats lurking out in the cyberspace. As per stats, email attachments are the no.1 delivery vehicle used by attackers for malware. And it is not shocking to see that 30% of phishing emails get opened.

Know your Vulnerabilities

The online hacking industry has gone creative and nasty in its ways to make attacks and take advantage of vulnerabilities. With this, the rising rate of cybercrime is a growing concern for many in the market. SMBs, also known as Small to Medium Businesses, are one category who need to think and implement about having strong cyber security tactics in order to prevent data loss.

Search