Dangerous Malware Discovered that Can Take Down Electric Power Grids
Last December, a cyber attack on the Ukrainian Electric power grid caused a power outage in the northern part of Kyiv — the country’s capital — and surrounding areas, causing…
Your Go-To Source for Cyber Security Insights and Solutions
Last December, a cyber attack on the Ukrainian Electric power grid caused a power outage in the northern part of Kyiv — the country’s capital — and surrounding areas, causing…
Is your computer vulnerable to attack from WannaCry ransomware? Read on as we explore all there is to know about the WannaCry ransomware attack. In this article, you will learn:…
Overview In Monero, it has been discovered and patched a critical bug that affects all CryptoNote-based cryptocurrencies and allows for the creation of an unlimited number of coins in a…
Tencent, Asia’s second highest valued tech firm, has bought a five percent share in Tesla. According to a filing, the Chinese firm scooped up 8,167,544 shares for around $1.7 billion…
SSH is the most secure means of connecting to Linux servers remotely. And one of the common errors encountered while using SSH is the “ssh: connect to host port 22:…
❗❗❗ATTENTION❗❗❗ Please use the LATEST version of the decoder, available here: UPDATE: 17-th July, a new version of Petya has been released. At the moment, there is no way to…
Victims of the Petya ransomware will be pleased to learn that there is a method to recover their files without having to connect the drive to a different computer. (I…
Petya is different from other popular ransomware these days. Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on the disk.…
Last week, the Association for Computing Machinery named Whitfield Diffie and Martin E. Hellman recipients of the 2015 Turing Award. They have been honored with this prestigious award for their…
The 2016 attack on Ukraine’s power grid that deprived part of its capital, Kyiv, of power for an hour was caused by a cyberattack. ESET researchers have since analyzed samples…