Recent Posts

Apple Airdrop Flaw and How to protect Yourself

hacker exploiting system vulnerability

Do you use Apple? Well if you do the chances are even if unlike me, you are not a fan of AirDrop, you would have used it a few times if not more. Here is what you need to know about AirDrop flaw. According to German researchers from Technische Universitat Darmstadt , it’s possible for strangers to discover the phone …

Read More »

Legacy Systems: Disadvantages and advantages

disadvantages of legacy systems

The investigation results from the Japanese gaming company Capcom attack released recently, have once again highlighted the disadvantages of legacy systems. But what are legacy systems anyway? Legacy Systems are older applications, outdated firmware, and devices that are end of support from the manufacturer or are not updated for a really long time. If you think you do not use …

Read More »

How to Secure Password: Best practices for 2021

how to secure password

Always remember the unpleasant fact that you can and probably will at some time get compromised. It may or may not be due to a mistake. Following the best practices around how to secure password curated by our research team will help you improve your security posture considerably. It will also help you to contain the damage if one of …

Read More »

Cyberattacks & Malware Trends for 2021

partially loaded bar for year 2021 on blue digital screen for malware trends

As we’re now in the 2nd quarter of 2021 and the data from Q1 of 2020 vs 2021 can be used to have a calculated prediction about what’s going to happen to Cyber realm for the rest of the year. COVID-19 hasn’t just brought along havocs the world has never seen before, not just for the physical realm that have killed more than 2.96 million lives (at the time of this blog) and incalculable socioeconomic collateral damages to the human race. But COVID-19 has much further negative impacts in the Cyber realm, some of which have not completely revealed.

Read More »