Do you know how they hacked your account? Part five: Keylogging

Keylogging  (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your keyboard in order to get confidential information about you. Of course they do this in a concealed manner, so that you won’t know you are being monitored while typing passwords, addresses and other […]

Do you know how they hacked your account? Part four: Viruses

In this part we will highlight some of the well-known types of computer viruses Trojan A Trojan horse (commonly known as a Trojan) is a type of malware that conceals itself as a normal file or program to trick you into downloading and installing malware.A Trojan can do many dangerous things to your system, like […]

4 Tips to secure yourself against being hacked

Following to our article ‘Do you know how they hacked your account? ‘, we are spotting easy to apply tips to save you against being the next victim. Antivirus Software    Antivirus software, sometimes called an anti-malware program (you can also call it AV if you want to show off), is computer software used to prevent, […]

Appointments on hold after Malware attack targeting Hospitals systems

Cyber attacks on hospitals have emerged as a significant cyber security risk in 2016, probably because hospitals have proven to be easy targetsA NHS trust in England shut down all of its IT systems last week including many planned operations, appointments, and diagnostic procedures after a virus compromised them last Sunday.In a bright-red warning labelled […]

Do you know how they hacked your account? Part one: Downloading the infection

A cyber-attack is classified as any type of offensive action used by cyber criminals to deploy malicious code in your system with the purpose of stealing, altering, destroying, or taking any advantage of this action. Cyber-attacks can target both people and things. ANYWHERE. ANYTIME.  Individual users, computer networks, information systems, IT infrastructure of all types and sizes […]

How you get infected by malware?

Malware (short for malicious software) is one of the terms you’ll hear most often when it comes to cyber security threats. The term defines any software used by cyber criminals to: disrupt computer operations, gather sensitive information, or unlawfully gain access to private computer systems. Malware is characterized by its malicious intent, because it acts […]

Importance of Strong passwords in Today’s world !

Passwords are the first line of defense against unauthorized devices or accounts entry. You may be open to hackers frequently using the same credentials or using ‘weak’ passwords. Strong passwords are essential to avoid unauthorized access to your online services and computers.A study conducted by BitDefender found that 75% of users also use their Facebook […]

Scroll to top