By the end of 2019, Emotet has started a new spam campaign that is luring people by using the popularity of environmental activist Greta Thunberg and her dedication to the climate movement. It seems that the users who think that they are being noted with the info about an upcoming “climate crisis” sort of demonstration, will instead find that they
The latest generation of cyber-attacks created an active underground economy, where stolen goods and illegal services are bought and sold in a ‘professional’ manner if there is such a thing as honor among thieves. Cyber crime now specializes in different “markets” that taken all together form the full criminal supply-chain. Because of this, cybercrime develops at a much faster rate.
Usually, when you open a website you see a pop up that asks you to accept cookies. And more than usually, you tend to click yes. But do we know what we’re agreeing to? Cookies have been part of the Internet since the dawn of the world wide web, but they are still a mystery to some users. And most
Almost every business nowadays is using cloud services for most of their critical business applications. Some of the most popular include Microsoft Office 365, Salesforce, Dropbox, Adobe, Google G-Suite… and many more. Every business stores a ton of very sensitive data in the cloud, these days more than before. When it comes to Amazon, Google and Microsoft, it is sure
The image that is created in the public’s mind is that hacking is inevitably a crime. Poorly socialized hackers lurk in basements across the globe and itch to access a bank account or steal identities. People that are more familiar with computer culture know that hacking like so many other things exists on a continuum. Not all hackers are inherently
The issue of data misuse of 50 million people has become relevant after the cases of Cambridge Analytica research firms. There was an enormous amount of consumer data available that are valuable assets of companies. Customer loyalty cards, while rewarding shoppers with discounts and deals are one easy way for companies to collect data on a large scale. Retailers need
As a decade has ended, it is time for us to retake the view upon the most serious and devastating cyberattacks that have occurred. Since 2010, billions of different sensitive files, account details and personal information have been leaked due to terrible hacks and various damaging breaches. One thing is for sure: the size and impact of the attacks have