Cybersecurity

The Twelve Days of Christmas Hacks

On the first day of Christmas, a hacker sent to me:Ransomware in my Christmas treeOn the second day of Christmas, a hacker sent to me:Two trojan horses, andRansomware in my Christmas treeOn the third day of Christmas, a hacker sent to me:Three DDOS strikes,Two trojan horses, andRansomware in my Christmas [...]

Cybersecurity

Sleep Mode Is Vulnerable to Cold Boot Attacks!

Research indicates putting your computer to sleep is not exactly the best idea in the context of cybersecurity. Instead, computer experts are insisting it is better to shut the computer down or let it hibernate. In short, sleep mode settings still leave your computer vulnerable to hackers. Read on: 3 [...]