Top Russian cyber units and hacking groups to watch out
With the cooptation or recruitment of criminal and civilian hackers, Russia has increased its personnel, capabilities, and capacity to conduct a wide range of...
Risks of using pre-owned, used mobile phones
Buying a brand new, high-end mobile phone may not be a viable option for economic reasons. Therefore, Consumers who don’t want to pay the...
Why does penetration testing matter?
Penetration testing assesses and exploits vulnerabilities in an application or infrastructure by circumventing or defeating security features of system components through rigorous manual testing.
Typically,...
Artificial intelligence: Privacy precautions in a digital world
Privacy issues are likely to escalate with the increasing use of online activities in the future on social media, smartphones and search engines like...
Mobile phone theft: Facts and prevention guidelines
It is hard to imagine a person without a mobile phone today. Almost everyone between 14 and 64 now owns a mobile phone. As...
Startup security: Importance of protection and key issues to consider
Launching your business venture can be incredibly exciting, but there is also so much to consider when taking the step. For example, it can...
Hiring a penetration tester: Guidelines for HR professionals
Penetration testing is the process of assessing an application or infrastructure for vulnerabilities through rigorous manual testing to exploit those vulnerabilities and circumvent or...
Romance scam: What you should know
Romance scammers (catfishers) prey on people's emotions and desires for companionship. To identify targets, perpetrators frequently create fake profiles on dating sites and social...
Vulnerability scanning vs. penetration testing explained
Generally, vulnerability scanning and penetration testing are used interchangeably by many people, either because of misunderstanding or marketing hype. The differences between vulnerability scanning...
Network penetration testing – Types, tools & best practices
Penetration testing is an authorized, proactive attempt to assess an IT system's security by safely exploiting its vulnerabilities to identify application flaws, improper configurations,...
Child sexual abuse and exploitation in the cyber world
Online child sexual abuse or online child sexual exploitation means using information and communications technology (ICT) to facilitate the sexual abuse and the sexual...
Five generations of cyber attacks in history
The IT security industry, which was essentially born in the 1980s, is now a multibillion-dollar industry that is vital, if not essential, to protecting...

















