Category: Cyber Security Threats and Vulnerabilities
Biggest Hacks of 2021
In 2021 hackers successfully executed thousands of hacks. The biggest hacks made worldwide headlines and caused severe disruptions, from causing a gasoline supply panic to…
5 Million Reasons to Invest in Training – The Colonial Pipeline Cyber Attack
On Friday, May 7th 2021, Colonial Pipeline, a privately owned pipeline operations company, learned that it was the victim of a ransomware attack. This event…
Social Engineering Principles
Most hackers are very socially aware. They’re very good at manipulating conversations and talking to people to get them to reveal information. Many stereotypes depict…
Spyware and Keyloggers
Spyware is any type of malware that is used to record or monitor user activities. This can include browsing activities, mouse movement, executed programs, and…
3 Popular Malware Attacks – Trojans, Rootkits, and Backdoors
A Trojan is named after the Trojan horse, which was a stratagem used in an ancient war between Greece and Troy. The Greeks were unsuccessful…
Ransomware and Crypto Malware
Ransomware is a type of malware that encrypts a victim’s data and then displays a ransom message to the victim demanding payment in exchange for…
Twitter’s Massive Account Hack
On Wednesday, July 15th, hackers successfully launched attacks against 130 Twitter accounts in an effort to fraudulently receive cryptocurrency. 130 accounts of famous individuals and…
Secure Your Zoom Meetings With These Eight Easy Steps
Last week, a doctoral candidate was forced to defend his thesis over Zoom. He invited his friends and family to watch this momentous occasion. Partway…
The Rise of Crypto Malware
Could your smart TV be mining cryptocurrency while you are watching “The Witcher”? Crypto malware is a new form of malware that uses device processing…

