Red Hat acquires Noobaa
Soon after Red Hat’s acquisition by IBM, Red Hat is now acquiring Noobaa. These two moves are related and have been seen as an excellent business strategy, to gain technological ...
Ransomware
Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded ...
IBM to acquire Red Hat: an overview
IBM’s announcement to acquire RedHat – the open source distribution giant – hit the headlines on last Sunday. This deal was done at a premium of more than 60% and ...
Agent Tesla
Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity ...
Cyber attack types to watch out for in 2018
Along with quick technical enhancements, security risks are enormous in today’s cyberspace. As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security ...
An effective cyber attack recovery plan for enterprises
In this digital-era of quick technical advancements, security threats are of ever-increasing concern. Cyber crime rates increase every year; so, being proactive against security risks by having an effective ...