Trojans: Definition, Types and Protection
Some cybersecurity threats are so old-school that you don't really hear that much about them—and they might even appear to slow down over the years. But since the beginning of the COVID-19 pandemic, threat actors and malware authors have been finding new ways to exploit the situation the world has found itself in. One of the most common tactics we're seeing is the use of trojans.
Who Are Cybercriminals? The 10 Most Infamous Cybercriminals
Throughout human history, crime has been ever-present. Whether it's burglary, theft, fraud, extortion, vandalism, or more serious offenses, it always followed us. But as technology progresses, criminals find more ways to conduct their illegal activities.
What is Hacktivism? Civil Disobedience, Cyberterrorism, or Something Else?
There are different motivations behind hackers' actions. They can be stirred by anything from monetary gain to bragging rights to boredom ('because they can'). But frequently, the driving force behind breaking into systems, stealing information and disrupting services is to demonstrate civil disobedience.
Top 9 Internet Search Engines Used by Security Researchers
We all know what internet search engines are, and why they're used. Even when you want to search for the most mundane thing ever, you can go to Google, Bing, Safari, or any of the other traditional web browsers. But what if you need access to information not usually found on those popular search engines?
Most Epic Hacker Movies of All Time
Hollywood has a knack for influencing public opinion on many different topics. It's been doing just that for over a century, and hackers have been no exception.
Top 10 Cybersecurity Legends You Should Know About
Cybersecurity is growing quickly and it might seem difficult to keep up with all the latest developments and trends. But there are some trends—or better yet, people—who have left their unmistakable imprint on the history of cybersecurity.
Hacker vs Cracker: Main Differences Explained
Media coverage of data breaches is increasing rapidly, especially with the public's watchful eye on organizations and the vulnerable systems they work with — easy targets for exploitation. However, the less-than-dramatic truth is that the frequency and scale of data breaches hasn't really soared* in the past decade, even if people are still at great risk of having their data exposed. The media itself has brought on the hype and created a fear culture around data breaches and malicious attackers.
Top 20 Google Hacking Techniques
Some time ago we wrote an interesting post about the OSINT concept and its importance in the security researching world, showing how easy it is to get information from publicly available sources on the Internet.
Top 10 Common Network Security Threats Explained
The old childhood warning "Stranger danger!" has withstood the test of time even in our modern, developed world.
How much cryptocurrency can a web cryptominer actually mine?
In 2017, we’ve seen a resurrection, of sorts, of web mining. Why do we say “resurrection”? Because despite a drop in popularity after its release to the world in 2011, it has recently been re-introduced to us in a new form.