Conti may have a headache

Conti is a group that uses multiple cyber attacks to make money. They primarily use social engineering through email and information gathering. They also rely on spear-phishing emails that convince the target that they are receiving relevant information from their company. Conti tends to work with other hacker groups such as Anonymous because they share similar values and goals. The case Conti is a group that hopes to make a …

Learn more →

Blackmailers are becoming more sophisticated

Digital blackmail, a type of extortion in which the perpetrator uses threats to extract something from the victim, is becoming more and more sophisticated. A copy of your most personal email messages, your social media account passwords, or even your nude photos could all be used to blackmail you. As ransomware viruses become more and more successful and profitable, playing a more prominent and more significant role in the illegal …

Learn more →

How to protect yourself from online traps

The internet has opened up many new avenues for security, both at work and home. Essentially anything that can be accessed through a web browser. Gone are the days when hacking was limited to either an office network or a home computer. With web-based applications, your data is never more than just one click away from being stolen. That’s why it’s crucial to protect yourself online with the tips in …

Learn more →

What should I do if a ransomware virus has infected my computer?

Have you ever heard of ransomware? It’s a type of virus that blocks access to your system or files unless you pay money, typically by bitcoin or other electronic payment methods. You may have heard stories about people affected by this virus, but did you know that it’s actually very easy to protect yourself? Read on to find out how! When trouble rises Suppose a ransomware virus has infected your …

Learn more →

Another trick in ransomware

The days of classic ransomware viruses are over, with scammers now not only encrypting data but also stealing it to trick victims into paying by threatening to disclose it. Some virus writers have recently gone to the trouble of phoning victims to remind them that a ransom payment is due. Of course, these are not private users, but invariably business users, as it is easy for them to find out …

Learn more →

Theft of personal data instead of recruitment

The world has changed a lot. We are no longer in the era of putting personal information on the Internet and using connected applications to recruit. Now, organizations such as Randstad keep sensitive data on their servers and use AI software to filter for potential employees without giving any information about the applicants directly to them. The case Randstad is an international organization with several job-seeker websites around the world. …

Learn more →

Ransomware attack against Campari servers

Even though many people think of hacking as something that happens to their devices and information, there are many more cases where hackers target businesses. In this case, the malware-infected Campari’s servers have a broad reach globally and locally. The case The servers of Campari, a manufacturer of alcoholic beverages, have been hacked and infected with a ransomware virus. The attackers first stole data and then encrypted the information on …

Learn more →

How to protect yourself against Trojans

You may have heard of ransomware viruses/trojans but don’t know the best way to protect yourself against them. Let’s break things down so that you can be more prepared. What are trojans? One of the biggest threats to users is ransomware viruses/trojans. What is it exactly? It is software that blackmails its victims. It does this by secretly sneaking into your computer and encrypting the data on your hard drive/SSD …

Learn more →

Ransomware hacked

It’s a big zoo, that’s for sure: a Turkish researcher wrote an open-source ransomware application for educational purposes, only to be surprised to find that his code was used to develop real ransomware. At least the expert was confident enough to reveal the backdoors in his program once this was discovered, which made it relatively easy to recover files.