Threats
Phishing: The Great Guide to Protection [2021]
Hundreds of millions of people around the world experience phishing every year. With the help of it, the largest companies...
Read more about Phishing: The Great Guide to Protection [2021]
How Malware Works and How Much Hackers Earn [2021]
Hello! My name is Dean Chester and I research security issues on the Internet. For this article, I contacted someone...
Read more about How Malware Works and How Much Hackers Earn [2021]
Is it possible to cause a blackout by hacking 250k electric cars?
Image source - Shutterstock I suppose you have never thought about the fact that your car can become a deadly...
Read more about Is it possible to cause a blackout by hacking 250k electric cars?
Understanding Cyber Security and modern threats
Did you know that invisible warriors are fighting for your online privacy right now? We go to work, play sports,...
Read more about Understanding Cyber Security and modern threats
Top identity threats to watch for in 2021 and how to protect against them
Did you know that your lovely Internet shop can store your payment methods nonencrypted? Or your smart home device can...
Read more about Top identity threats to watch for in 2021 and how to protect against them
Internet Safety 101: A Parent’s Guide to Their Child’s Safety on the Internet for 2021
Worried about what your child is looking at on the internet? Are you sure your child is safe while using...
Read more about Internet Safety 101: A Parent’s Guide to Their Child’s Safety on the Internet for 2021
How can Smart Cities assist Cybercriminals in extending their Botnets?
Can you guess most favorite device type for Botnet creators? It is not hard at all, it is Internet-of-Things. They...
Read more about How can Smart Cities assist Cybercriminals in extending their Botnets?
Mobile Cyber Security Threats [2021]
Is it possible to hack a smartphone that contains an electronic copy of our lives? To answer this question, I...
Read more about Mobile Cyber Security Threats [2021]
Metaverse and security risks through VR and AR
"Fantasy world is no longer imaginative." With Facebook introducing Meta and Virtual Reality, a new wave of concerns and critiques...
Read more about Metaverse and security risks through VR and AR
SMS-based attacks and leak from SendPulse
During 2021, FluBot, a malware that spreads through SMS messages, infected tens of thousands of Android devices. Attackers send texts...
Read more about SMS-based attacks and leak from SendPulse
SQL Injection targets AWS S3 Buckets and Azure Data blob
According to a vulnerability report made by Edgescan, SQL Injection accounts for 42% of the critical vulnerabilities found in the...
Read more about SQL Injection targets AWS S3 Buckets and Azure Data blob
”Money doesn’t equal happiness” - reality of hackers’ life
I would live my life differently and never embark on a cybercriminal career that forces me to lie to my...
Read more about ”Money doesn’t equal happiness” - reality of hackers’ life
Knocking to Microsoft Azure targets
Enterprise usage and adoption of cloud technologies continue to experience tremendous year-over-year increases as the cloud pricing model, implementation flexibility,...
Read more about Knocking to Microsoft Azure targets
Online game cheats – a threat to the E-sports industry in 2021
Did you ever come across a player (hacker) with exceptional powers while playing Dota 2, Fortnite or, PUBG? The E-sports...
Read more about Online game cheats – a threat to the E-sports industry in 2021
10 biggest data breaches in 2020-2021. Leakage protection.
Data breaches that have happened recently, recent trends, advice from an experienced hacker, new laws, and much more in a...
Read more about 10 biggest data breaches in 2020-2021. Leakage protection.
Internet Safety for Teens, Kids, and Students
The functionality and convenience of today's Internet are truly staggering. At the same time, it can be an immensely dangerous...
Read more about Internet Safety for Teens, Kids, and Students
How to organize threat intelligence data?
I bet you have seen the pyramids of Giza at least once in a movie or a picture. But have...
Read more about How to organize threat intelligence data?