Skip to main content

Most recent hacker attacks

2017 was not a lucky year for cybersecurity. To be precise, it was one of the worst years, according to countless critical reviews. Most of the attacks were able to happen because companies do not pay enough attention to their cyber hygiene. There is a tendency of poorly protected servers and admin accounts, and this makes the job really easy for hackers. The cyberattacks highlighted the alarming vulnerability of our personal information, but which were these attacks? Today we summarised the most burning ones from the most recent period. [...]

The General Data Protection Regulation

According to the official statement, The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union, and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). GDPR requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. [...]

Discussing AES-256 encryption method

At Docubank we use the AES-256 method for our end-to-end encryption service. The method has a long history, it gained fame after it was first used by the US government to protect classified information. Since then it has been spreading around the globe and is used for securing sensitive data in various industries. Today we share some basics about AES encryption to understand its role in securing sensitive files. [...]

Biggest security breaches of the 21st century

Previously, we were discussing the topic of inside security breaches that can be a threat to enterprises. In today’s article, we will go on and complete the list with some of the biggest and most famous outside security breaches of the 21st century. A secure network is a sign of a good IT staff, but when nothing happens, it is hard to notice that everything is working well. However, when something does happen, that is usually bad in terms of security-related issues. But what were the most famous threats, that made companies fall on their knees? [...]

How e-mail hacking works?

E-mail hacking is on the rise for companies, and this is not a surprise. As businesses go digital, e-mail data is becoming more valuable for hackers. SMEs and big corporations are being attacked as well, and the impacts can be very serious in every case. There are however reliable ways to prevent email hacking and reduce their impact. [...]

A message that can crash any iPhone

A single character: this is what it takes to crash your iPhone, and block access to messaging apps like WhatsApp, Facebook Messenger, Outlook for iOS, and Gmail. The new bug not only affects iPhones but other Apple devices like iPads, Mac or OS Watches that are running on the latest version of the operating system. This new text bomb bug can easily be exploited by anyone, as it only requires the user to send a character from the Telugu language. [...]