CryptoLocker – Unexpected Ransomware
Cryptolocker can reach the computer in two ways. E-mails and websites were mainly used as a gateway. In the email…
PlugX – know as a modular tailgate
The PlugX family of malware is well known to researchers, with samples dating back to 2008, according to Trend Micro…
Satan – A computer hijacker virus
Satan, a virus that was discovered in 2016, this virus does two things: it encrypts files and corrupts the main…
Vulnerabilities which you should not ignore in TikTok
The original name of the app is Douyin which means “shake the music” in Chinese. This name comes in handy,…
Anti-DDoS systems – what does these systems offers
Anyone with bad intentions can hire a hacking service for a targeted attack. Malware tools are accessible, easy to use,…
Data breaches – main reason for closing companies
Data breaches are one of the top concerns for organizations today. The costs of these gaps continue to rise, with…
Big Data – What this term is used for
When we speak of Big Data we refer to data sets or combinations of data sets whose size, complexity and…
What is cyberwar or technological warfare
The Cyberwar has been used to terrorize individual companies and entire governments. Civilians are denied basic services like electricity and…
Fuchsia OS – A futuristic operating system?
Google is immersed in the development of a new operating system. With Fuchsia OS, the technology group abandons the Linux…
WAN, WLAN, MAN and LAN what you need to know?
There are many terms related to networks and the Internet that we can see. When we navigate different devices and…

