Tag Archives: malware

The ABC’s of Cybersecurity: K- O

The ABC’s of Cybersecurity: K-O Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

CyberHeadlines: The Return of Locky, Russian Cyberspies, and Iran Petrochemical Malware

Cyber Headlines: The Return of Locky, Russian Cyberspies, and Iran Petrochemical Malware In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit down with… Read more »

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016 In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit… Read more »

Protected: CounterTack Partnership Announcement

Manpreet Wadan   July 5, 2016   Enter your password to view comments.

Cyber Threats: Drive-by Download Attacks

cyber threats types of cyber attacks

Cyber Threats: Drive-by Download Attacks Drive-by Download Attacks are ignited simply by a victim clicking a link which, unwittingly to them, injects malicious software onto their computer- or other device. The malware most frequently used in Drive-by Download Attacks are called Trojans. Trojans get their name for their deceitful nature; so… Read more »

Cyber Threats: Advanced Persistent Threat Attack

advanced persistent threat

Cyber Threats: Advanced Persistent Threat Attack The goal of an advanced persistent threat attack (APT attack) is to maintain covert, ongoing access to a network. This allows hackers to continuously gather valid user credentials and access to more, and more, valuable information. An Advanced persistent threat attack aims to gather information rather… Read more »

Friday Cyber Headlines: The Ever Evolving Ways of Dridex

Video Blog: Every Friday, we present to you the most pertinent, news-worthy stories regarding cyber safety. As we continually rely on online platforms to store our most private and vulnerable information, new techniques are in constant development in order to take advantage of this progressive landscape. Luckily, we’re here to… Read more »