How Countries Can Combat Against Cyber Security Attacks

how countries combat cyber security attacks

On 15 August 2012, Saudi Aramco (an energy company) was struck by a malware named Shamoon that stole admin credentials to spread a Disttrack wiper attack on a local network thus bypassing Aramco’s security. This caused over two weeks of irregular system availability after it infected over 30,000 computers. Another…

Read More

Using Two-Factor Authentication For Better Protection

two factor authentication

Today, passwords alone are not enough to protect your precious accounts. It is not wise to ignore the capabilities of two-factor authentication with hackers on the rise. If you wish to keep your accounts safe from snoopers and hackers, it's time to learn more about 2FA. Let's find out more!…

Read More

Cyber Threat Spotlight: Jaff Ransomware

Jaff ransomware

Cyber attacks continue to grab the headlines worldwide, as threat actors use ransomware to extort money from potential victims. Previously this kind of attack could be removed from an infected computer but recent ransomware attacks have caused major issues, even for the experts. “Scareware” as it is also known, intimidates…

Read More

The Impact Of Edward Snowden On The World

impact of Edward Snowden on the world

In June 2013, American citizen Edward Snowden gave a journalist from The Guardian leaked documents from the National Security Agency that pertained to domestic spying that would reverberate worldwide. The revelation by the newspaper as they disclosed thousands of classified documents showed how the USA utilized a clandestine surveillance program…

Read More

The Key Differences Between Proxies And VPNs

differences between proxies and VPNs

New to proxies and VPNs? If you are not completely sure what they are or which option is better for your needs, you have come to the right place. In this post, we will break down the key differences between proxies and VPNs so that you can make an informed…

Read More