Security

STOs: The Quiet Blockchain Revolution

In a galaxy far far away, a space MMO game turned to an STO (Security Token Offering) to raise capital.…

2 months ago

Malware: A Problematic Evolution

Malware has been around since computers' early days and is not going anywhere. But what is malware? And why should…

3 months ago

Smart Contracts: Security Concerns

Smart contracts are protocols written in a programming language like Solidity and deployed to the Ethereum blockchain. These self-executing programs…

4 months ago

Criminals Target Alibaba Cloud ECS instances For Cryptojacking Efforts

The cryptocurrency industry has always attracted criminals, just like any other financial segment. However, the recent attacks against Alibaba cloud…

1 year ago

The sneaky new way that pyramid schemes are making a comeback in our modern day lives

And no, we don’t just mean schemes that promise to make you rich as long as you force your friends…

1 year ago

No More Ransom Is Invaluable But The Ransomware Arms Race Won’t Stop

Ransomware is one of the biggest security threats to institutions, companies, and consumers alike. With the help of the No…

2 years ago

REvil Issues A $70 Million Bitcoin Ransomware Demand Following Supply Chain Attack

It almost seemed as if the correlation between Bitcoin and ransomware was finally a thing of the past. But, sadly,…

2 years ago

Recently Fixed Google and Apple Exploits Continue to Raise Questions

Security bugs are not all that difficult to come by these days. Particularly mobile devices and web browsers have a…

2 years ago

The State of eCommerce Fraud in 2020

It is not entirely surprising to see ecommerce fraud rise significantly in 2020. More people shop online, creating a bigger…

2 years ago

Maze Ransomware Creators are Looking for one “big Haul” Before Signing off

Numerous types of ransomware have made their mark on the IT industry over the years. Maze has always been one…

2 years ago