Trojan What is a Trojan horse and how do I protect against it? Taking its name from the well-known legend of the Greeks infiltrating the city of Troy…Brad30th October 2020
Ransomware What is ransomware and how do I protect against it? While disruptive spam and phishing emails can cause chaos for an enterpriseโs business processes, malicious…Lydia28th October 2020
Ransomware Major cybercriminal gang swaps phishing for ransomware A hacker gang that usually focuses its efforts predominantly on financial cybercrime has switched its…Mark26th October 2020
Ransomware New stealth Trojan employed in ransomware raids One of the latest types of Trojan Horse malware developed, a stealthy program known as…Lydia24th October 2020
Ransomware Ransomware outfit demands millions from tech giant The second largest enterprise in Germany, and one of the biggest software firms in the…Brad22nd October 2020
Ransomware What is malware and how do I protect against it? Among the many security topics covered by the EUโs dedicated annual campaign, European Cybersecurity Month,…Lydia20th October 2020
Spoofing What is a network spoofer and how do I protect against it? In terms of IT security, a spoofer is an individual who assumes the identity of…Mark18th October 2020
Spoofing What are the dangers with my email being spoofed? When threat actors send out emails with a sender address that is not their own,…Lydia17th October 2020
Spoofing My email has been spoofed โ what should I do? Spoofing emails is among the most prevalent forms of hacker activity involving email communications. Exposed…Mark17th October 2020
Business Whatโs your companyโs digital footprint? Among the latest attacks made on enterprises by cybercriminals are spear phishing tactics. These campaigns…Brad16th October 2020