Teenager, 18, charged with creating virus which ‘crashed

Teenager, 18, is charged with creating computer virus which ‘crashed hundreds of financial institutions including Nationwide bank and server hosting boxing match between rapper KSI and YouTube star Logan Paul’

  • Josh Maunder, 18, allegedly made a computer virus that crashed global banks 
  • He faces 21 charges, Newtownards Magistrates Court in Northern Ireland heard
  • The server hosting a boxing match between

What is Spyware and How to Protect Against it?

Did you know every 39 seconds, at least one system gets compromised worldwide? It could be via virus malware, phishing, social engineering, fileless malware, etc. So, we’re here to talk about one such common tactic: Spyware.

What is spyware and how does it work? You’ll find the answers below as well as the various types,

Password Tips to Protect Your Data

Protect Your Data : As cyber attacks seem to become increasingly more prevalent, far-reaching and long-lasting in their damage, it’s more important than ever that you and your employees do everything possible to protect your company’s data. One often overlooked way to keep sensitive information safe is paying extra attention to password security.

Passwords are valued currency in the Digital

Computer Viruses Made Easy

I Viruses

1 Definition — What is Malicious Code?

Computer Viruses : Malicious code refers to any instruction or set of instructions that perform a suspicious function without the user’s consent.

2 Definition — What is a Computer Virus?

A computer virus is a form of malicious code. It is a set of instructions (ie. a program) that is both

The Anatomy of Cryptolocker Ransomware

Cryptolocker Ransomware : The concept of holding your data for ransom is new but it’s been fledgling nevertheless. Millions of dollars have been raked in by attackers across the world. Traditional methods, which typically include breaching the security layer, penetrating the system, taking over it, and selling the data, is done away. Instead the data is encrypted using public key

The Seven Ravens of Cyber Attacks

Cyber attack is the most common medium for theft that trained IT criminals are utilizing these days. Such attacks, which range from stealing individual or corporate data to creating multimillion-dollar scams, are reported with increasing frequency. Professional cyber thieves either secretly assume control of the user’s system or steal away the user’s credentials. These cyber criminals have mastered loopholes and