
Black and white: Not all hackers are bad
When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he

Businesses are using mobile devices more than ever to increase productivity and profitability. However, like desktops and laptops, smartphones and tablets are highly vulnerable to

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from

While a vast majority of ransomware that’s been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new
"*" indicates required fields