Cyber Security News & Resources
The Effectiveness of Cryptocurrency Mining Malware Removal Tools
This new threat to network vulnerabilities is made possible by the recent increase in the use of the currency in cyber crime. Cryptocurrency Mining Malware is the fastest growing criminal activity from a cyber security perspective. As a result of its popularity, it is...
What is a Fall Attack?
A drop attack is often the outcome of a direct blow to the neck or head. Though they are often associated with sports-related trauma, military and police training may also result in such an injury. A serious blow to the head can cause the death of an athlete or the...
A Guide To Red Team Security Testing And Remediation
Redteam is a leading provider of Penetration Testing, Social Engineering and Red Teaming services. They have offices in North America, UK, Australia, Spain, Vietnam, China, Italy and India. It has earned a good name as one of the top IT consulting companies. With over...
The Complexities of Bank Cyber Security
Bank Cyber Security is an ongoing concern to many financial institutions. Due to the recent upswing in Internet fraud and other crimes, more banks and lending institutions are investing in cyber security for their networks. While it is true that the costs of cyber...
What to Do If You Just Got Ransomware on Your Computer
There are many security holes in the current crop of malicious software such as the recently released Remote Access Virus that is what to do when it comes to dealing with Ransomware. This type of malware is one that is commonly referred to as "malware" (malicious...
What Is a Thumb Drive?
The other day I was talking to someone who has an IT background and she asked me what is a thumb drive? She wanted to know about RDI-MS (Remote Direct Memory Devices) and what they are used for. Well, let me tell you, that is quite a loaded question and one that need...