Google Outage 2020: What Happened?
Users of Gmail, Google Drive, and YouTube around the world were affected by an unexpected outage on December 14, 2020. On Gmail, people were informed that their accounts were temporarily …
Freelance Blog Writer | Cyber Security Content Writer | Ireland
Users of Gmail, Google Drive, and YouTube around the world were affected by an unexpected outage on December 14, 2020. On Gmail, people were informed that their accounts were temporarily …
Often, the mechanism by which a malicious party gains access to a network is by getting an unknowing victim to run unsecured code inside that network. The third party can …
Read moreWhy Code Signing Provides a False Sense of Security
This hypothetical scenario shows how easy it could be for an attacker to establish the pretext for gaining entry into a corporate network using a Word macro virus. It is …
Cybersecurity software companies have a habit of latching on to certain buzzwords or other jargon terms in order to attract new business. You’ve probably heard of SIEM solutions if you …
On this page, I want to talk about a fascinating area of information security, which is ethical hacking. I’ll define what it is, talk about the three types of hackers, …
Sometimes there are solutions in IT that solve so many problems, it’s hard to believe that not every business uses those solutions or even knows about them. Load balancing is …
On July 15th, 2020, leading social media platform Twitter experienced a sophisticated cyber attack that caused untold disruption to the platform. The attack itself appears to be an example of …
Read moreTwitter Security Breach 2020: A Successful Social Engineering Attack
Data is one of the most important assets for organizations of all sizes. Organizations use database management systems to handle the storage, querying, and retrieval of their data. These tasks …
In much the same way that different human viruses cause different symptoms, there are different types of computer viruses that do different types of damage to computer systems and networks. …
You don’t need to be an expert who knows exactly how cryptography works in your organization, but it’s a good idea to become familiar with what cryptography actually does for …