Introduction to RAID and its MarketRAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard... BLOG Top 8 Mobile Security Threats In 2020 April 15, 2020 With the passing of 2019, the second decade of the 21st century has also ended. Looking back at the past... Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal... Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are... What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also... Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions... Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of... Role of CISOs in Organizations April 10, 2020 The Chief Information Security Officers (CISOs) are one of those C- level categories in most organizations who have lately gained... LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent... LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular... Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus... How Much Do You Know About NIST Cybersecurity Framework? April 9, 2020 Faced with the threat of major cybersecurity incidents in recent years, in February 2013, US President Obama issued Executive Order... 10 Best Practices for Your Firm with Microsoft 365. All the Microsoft Security Products are Listed Here! April 8, 2020 Microsoft Office 365 – how can we function in the professional and academic world without it? It provides Outlook, Word,...
Introduction to RAID and its MarketRAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard...
BLOG Top 8 Mobile Security Threats In 2020 April 15, 2020 With the passing of 2019, the second decade of the 21st century has also ended. Looking back at the past... Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal... Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are... What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also... Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions... Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate... Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of... Role of CISOs in Organizations April 10, 2020 The Chief Information Security Officers (CISOs) are one of those C- level categories in most organizations who have lately gained... LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent... LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular... Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus... How Much Do You Know About NIST Cybersecurity Framework? April 9, 2020 Faced with the threat of major cybersecurity incidents in recent years, in February 2013, US President Obama issued Executive Order... 10 Best Practices for Your Firm with Microsoft 365. All the Microsoft Security Products are Listed Here! April 8, 2020 Microsoft Office 365 – how can we function in the professional and academic world without it? It provides Outlook, Word,...
Top 8 Mobile Security Threats In 2020 April 15, 2020 With the passing of 2019, the second decade of the 21st century has also ended. Looking back at the past...
Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal...
Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are...
What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also...
Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions...
Travelex Pays $2.3M Bitcoin Ransom to Hackers April 14, 2020 On New Year’s Eve in 2020, just as everyone had entered the holiday mode and the family started to celebrate...
Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic April 11, 2020 To curb the spread of COVID-19, millions of people were forced to stay at home. Zoom has become one of...
Role of CISOs in Organizations April 10, 2020 The Chief Information Security Officers (CISOs) are one of those C- level categories in most organizations who have lately gained...
LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent...
LIFARS Insights: CVE impacting Windows April 10, 2020 Microsoft releases Software fixes to address various Common Vulnerabilities and Exposures (CVE) as a catalog of security threats, at regular...
Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus...
How Much Do You Know About NIST Cybersecurity Framework? April 9, 2020 Faced with the threat of major cybersecurity incidents in recent years, in February 2013, US President Obama issued Executive Order...
10 Best Practices for Your Firm with Microsoft 365. All the Microsoft Security Products are Listed Here! April 8, 2020 Microsoft Office 365 – how can we function in the professional and academic world without it? It provides Outlook, Word,...