Data leaks, privacy intrusions, ransomware attacks - dangers such are these seem to be both increasingly frequent and subsequently larger in scale. This is the price we pay for living in a deeply interconnected and digitalized cyber-scape. Damjan, whose career started in anthropology, applies his background in humanities to analyze and dissect the Brave New Cyber World we live in. His main interests are cybersecurity, cryptocurrencies, and AI. Besides writing reviews, he spends time digging up dirt on Big Tech, advising people on safe Internet practices, and cleaning his tin foil hat.
How Does Antivirus Work?
An apple a day keeps the doctor away, and antivirus software keeps malware at bay. If it takes your computer ages to open a file, if you’ve been seeing aggressive pop-ups everywhere, even when you are offline, perhaps it’s time to bring out the big guns and invest in good malware protection. But
ExpressVPN on Chrome: How To Add It and What It’s For
ExpressVPN is a market leader in the VPN world. Boasting a 3,000-strong server network spread across 160 locations in 94 states, a strict no-logs policy, and the fact that it’s headquartered in the British Virgin Islands (away from intrusive privacy laws) only serve to increase this VPN’s popula
61% of Employees Can’t Answer Simple Cybersecurity Questions
Nearly 70% of employees who participated in a survey conducted by TalentLMS, a company providing e-learning solutions, said they recently had cybersecurity training organized by their companies, yet 61% of them failed to answer basic questions related to cybersecurity. A thousand and two hundred
Cyber Attackers Actively Exploit Known SAP Vulnerabilities
A joint SAP and Onapsis report says that hackers are exploiting known SAP vulnerabilities to take control over exposed SAP apps and steal sensitive information. It warns that cyber attackers could use the unpatched SAP apps on the Internet to commit ransomware attacks and financial fraud. It also re
The Complete ExpressVPN Torrenting Guide
In our ExpressVPN torrenting guide, we’ll introduce ExpressVPN - one of the most capable VPN providers on the market - and how you can use it to torrent. Alongside giants like NordVPN and CyberGhost, ExpressVPN provides a much-needed layer of privacy in an increasingly dangerous online world. VPNs
Darktrace Preparing for London Stock Exchange IPO
Darktrace is the first cybersecurity company in the past three years to have a London-based IPO (initial public offering). It’s estimated that the company could be valued at $4.12 billion after going public. Darktrace’s IPO is expected to raise anywhere from $350-400 million. According to Dar
IoT Devices At Risk From DNS Flaws, Forescout Warns
Forescout Research Labs are raising awareness about new Domain Name System (DNS) flaws which could allow hackers to control the internet of things (IoT) devices. “NAME:WRECK” is the common moniker for these DNS implementation vulnerabilities. The issues affect FreeBSD, Nucleus NET, IPnet, and
Cybersecurity Market Size To Reach $192.7bn by 2028
Grand View Research published a paper in April suggesting that the global cybersecurity services market size will expand at a growth rate of 10.2%, ultimately reaching the value of $192.7 billion in 2028. The basis of these estimates was the historical data from 2016 to 2019. The year 2020, with
FBI Patches Up Hacked Microsoft Exchange Servers
Months after Hafnium - a group of China-based hackers - exploited four previously unknown vulnerabilities in Microsoft Exchange Servers, a court in Houston greenlighted the FBI’s operation to “copy and remove” backdoors from the affected servers. According to the announcement the Justice Depar
How To Use ProtonVPN: A Step-by-Step Guide
VPN used to be one of those dodgy words whispered around dark corners of the web. Now, everyone uses it to protect their web traffic. If you’re planning on dipping your toe into the world of virtual private networks, you might have already heard of ProtonVPN - a tried and true software with bel
Hackers Use GitHub Servers for Cryptocurrency Mining
Cybercriminals have infiltrated the code-hosting platform’s server infrastructure to use its resources for illicit cryptocurrency mining. The information comes from a report published by The Record, whose team confirmed the story with a GitHub spokesperson. The electronic break-ins started in t
APT actors exploiting vulnerabilities in the Fortinet VPN operating system
The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have warned that APT (advanced persistent threat) nation-state actors are exploiting security vulnerabilities in the Fortinet cybersecurity operating system. According to the alert issued by these agencies, APT actors are s