by admin | Nov 2, 2018
Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded some of money is paid. As per records, ransomware variants were found as early as...
by admin | Oct 31, 2018
IBM’s announcement to acquire RedHat – the open source distribution giant – hit the headlines on last Sunday. This deal was done at a premium of more than 60% and its $34 billion price tag shook the cyber world. Due to revenue-decline for some years, IBM needed plans...
by admin | Oct 24, 2018
Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity recently by having more than 6,300 customers who pay a monthly...
by admin | Oct 17, 2018
Since 2004, NCSAM has been observed in the month of October, in the United States of America (USA). NCSAM stands to encourage vigilance and protection by computer users. All of us know that in today’s IT enabled world, national security goes hand in hand with...
by admin | Oct 12, 2018
Along with quick technical enhancements, security risks are enormous in today’s cyberspace. As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security threats will emerge every year. Let’s look at some of the...