As we steadily adopt smart devices into our lives, we shouldn’t forget about keeping them secured and our data protected. As we aim to make our lives simpler to manage, especially in this hurried day and age, we increasingly rely on our connected devices. With Internet of Things (IoT) and smart devices becoming cheaper and … More 5 steps to secure your connected devices
The digital world knows many threats and malware can be one of the nastiest. To keep children, teenagers as well as adults safe, we will go over the most common types and forms of malicious code they can encounter and offer actionable tips. What is malware? Let’s start with the word malware. It is a blend of … More Learning to recognize malware and its dirty tricks
File-less malware attacks leave little trace, which makes them all the more threatening. A file-less malware attack doesn’t even need to install software on a victim’s machine and is instead based on an attacker taking control of something already installed on your computer. A file-less malware attack often latches onto a built-in component of Windows … More What exactly is a file-less malware attack and how could it affect your business?
Security researchers have demonstrated how attackers could cause physical damage to hard drives, and cause PCs to crash, just by playing sounds through a computer’s speaker. A denial-of-service (DoS) attack against your organisation’s website is bad enough, preventing customers from reaching your online presence and perhaps preventing you from processing new orders – but imagine the chaos … More An acoustic attack can blue screen your Windows computer
I was a young mathematics professor at Massachusetts Institute of Technology (MIT) when I read Richard Dawkins’ description of memes. I recall thinking: “Oh, that’s how it all works”. Memes are a generalization of genes, and, among other things, they include your beliefs. After studying memes for many decades, I have come to think that they are … More Memes: the explanation of nearly everything – including computer viruses