The last few years have seen the rise of bug bounty hunters: security researchers who find software bugs for a fee, rather than exploiting them. Most ...
Hackers are more aggressive than ever. Traditionally, cybercriminals would only encrypt data before seeking a ransom. But in a move popularized by the...
In a digital age, more and more healthcare services are moving online. From electronic patient logs to virtual counselling to an increasing array of m...
In a digital age, more and more health care services are moving online. From electronic patient logs to virtual counselling and an increasing array of...
As our lives become increasingly digital, it’s more important than ever to make sure that your household is protected from cyberattack. Cybercrime a...
Poor password habits are one of the biggest threats to organizational security. Why? Hackers know that most employees tend to reuse generic, easy-to-g...
The health sector has long been a frequent and favoured target of attackers. And with the transition to virtual care, cybercrime against healthcare pr...
It’s only been a month and experts are already calling the Log4j vulnerability one of the . Given the prevalence of Log4j software, it’s impossibl...
The Log4j vulnerability sent shockwaves throughout the entire cybercommunity when it was discovered in December 2021. Since then, organizations have b...