Skip to main content

Most recent hacker attacks

2017 was not a lucky year for cybersecurity. To be precise, it was one of the worst years, according to countless critical reviews. Most of the attacks were able to happen because companies do not pay enough attention to their cyber hygiene. There is a tendency of poorly protected servers and admin accounts, and this makes the job really easy for hackers. The cyberattacks highlighted the alarming vulnerability of our personal information, but which were these attacks? Today we summarised the most burning ones from the most recent period.

Share this post

Comments ()

The basics of credit card hacking

As nowadays fund transfers and online shopping are taking up a huge majority of our finances, the number of related of frauds are on the rise as well. Today we dive into the topic of credit card hacking. We will discuss vulnerabilities in credit and debit card functionality that can help hackers steal data.

Share this post

Comments ()

How e-mail hacking works?

E-mail hacking is on the rise for companies, and this is not a surprise. As businesses go digital, e-mail data is becoming more valuable for hackers. SMEs and big corporations are being attacked as well, and the impacts can be very serious in every case. There are however reliable ways to prevent email hacking and reduce their impact.

Share this post

Comments ()

How social engineering can be a security issue

Strong passwords, two-factor authentications, using different accounts: the basics of IT security might sound familiar to you. We have also been writing articles on the issues, but we have jet not covered a very important risk in IT security, namely social engineering. Let’s look into it, and discuss how we can fight it to protect ourselves.

Share this post

Comments ()

How bad is it to use open WIFI networks?

When the topic of using open WIFI networks comes up, the majority of the people do not mind it, however, there is that small group of professionals who would never want to use the service, and would rather just rely on their mobile internet. But how bad is the situation really? There are rumors and facts out in the public about hacking free WIFI systems and monitoring users’ activities, but how common is that present? In today’s article, we will dig a little deeper in the topic to see if there is something to fear about them in our everyday lives.

Share this post

Comments ()

Ethical hackers: how they help us

From the word “hacker” lot of people think of dark, wicked men sitting in server rooms, surrounded by high capacity computers, doing bad. Many do not know that this definition is most likely to fit crackers, who are the ones that violate systems and break into networks with malicious intent. Hackers, on the other hand, are trying to enter systems to find dangerous holes in them and share their knowledge so that those threats can be eliminated. But as the terminology is mostly mixed up nowadays, we usually use “ethical hacker” for the good guys and hackers/crackers for the bad ones.

Share this post

Comments ()

How cell phone hacking can affect you?

Cell phones, connected to e-mail and social media accounts are a sensitive area and have a major risk of being hacked. Our cell phones have access to our Dropbox, Gmail, Facebook, Twitter, Instagram accounts, and in most cases to our banking information. A hacked cell phone makes blackmailing, identity theft and losing money a great threat for the owner of the device. With some social engineering, a telephone number and some basic IT knowledge, it is an easy job to hack one’s phone. A trustworthy but otherwise fake site that is convincingly copying a service you use is enough to get the sensitive information they need for a successful hacking.

Share this post

Comments ()