Blog

Read our insights on changing regulations and other technical topics.

End-to-End encryption (E2EE) After several false starts, the video-conferencing software Zoom is rolling out End-to-End encryption (E2EE) for all users. Despite a huge …
GravityRAT Spyware GravityRAT pretends to be an application but in reality, is an espionage tool that steals people’s information. The program retrieves personal …
Businesses of all sizes collect and store hordes of data including consumers’ banking credentials — data that can be stolen and used maliciously. …
Facebook  Facebook is the heavyweight of social media platforms, dominating the others with 2.45 billion monthly users. While those numbers make it a …
Cybersecurity Playbook No one could have foreseen the COVID-19 pandemic. While most disaster recovery plans cover earthquakes, hurricanes, and other natural disasters, the …
Next Frontier in Cybercrime Cybercrime has been on the rise and calls for necessary action to buff the security of your systems. Cybersecurity …