• LOGIN
    • No products in the cart.

Login

Retrieve Password
Back to login/register

Blog

Latest news around the world

16

Nov'16

How “Fileless” Ransomware Works | Infographic by CrowdStrike

  A deep dive into ransomware’s evolution and why businesses can’t afford to ignore it Ransomware has grown up. Once …

Read More

14

Nov'16

“Security-phobia is a good and healthy thing” – Interview with Mohamed A. Baset, creator of QRLJacking

Hello folks, In our previous post you had a chance to read a brief description about QRLJacking – A new Social …

Read More

14

Nov'16

QRLJacking – A new Social Engineering Attack Vector

  The SQRL, or Secure Quick Response Login, a QR-code-based authentication, is an amazing system that makes our lives easier, …

Read More

04

Nov'16

Ransomware: Rescue Plan – Infographic by TrendMicro

What makes ransomware so effective? One reason—fear. Just like any traditional extortion op, ransomware operations succeed because they capitalize on …

Read More

24

Oct'16

Malware Has Gone Mobile. Stop.Think.Connect. to keep cybercriminals out of your mobile device

Mobile devices such as smartphones or tablets have become ingrained in our daily lives. Technology which was once only found …

Read More

19

Oct'16

Zepto Ransomware Is Here

  By now, you should be familiar with the term Ransomware. For those who are unaware, Ransomware is a particularly …

Read More

18

Oct'16

How does ransomware encrypt files?

Ransomware.  The very word strikes fear in the hearts and minds of CEOs, CSOs and IT security managers alike. So …

Read More

17

Oct'16

What is Cyber Surgery?

  GOVERNMENT ACCREDITED SECURITY CONSULTANCY LAUNCHES FREE CYBER HEALTH CHECK FOR SMALLER BUSINESSES UK SMEs woefully under protected Financial and …

Read More

12

Oct'16

TalkTalk: Fine should be a wakeup call to businesses | by Anthony Daly

TalkTalk: Fine should be a wakeup call to businesses by Anthony Daly – Cyber Security Consultant   TalkTalk’s fine of …

Read More

07

Oct'16

Report About Phishing Attack (email spoofing) by Mehrdad Yazdizadeh

PHISHING by MEHRDAD YAZDIZADEH- SECURITY CONSULTANT 9/21/2016 Phishing is the attempt to obtain sensitive information, such as usernames, passwords, and credit …

Read More