Category:

Cyber Attacks

Wannacry: The Global Ransomware Attack

As on May 2017, a global ransomware campaign started attacking computers around the world with a ransomware variant called WannaCrypt malware (alternatively known as WCry, WannaCry or WanaCrypt0r), hitting dozens of organizations across the globe. Among the victims are universities in China, Russia’s Ministry of...

Wannacry: The Global Ransomware Attack
May 23rd, 2017

How to Prevent your System from Ransomware WannaCry Attacks?

Over the course of Friday , 12th of May 2017 we noticed multiple reports of organizations across multiple verticals being victim to a ransomware attack. Ransomware is a type of malware that prevents or limits users from accessing their system,...

How to Prevent your System from Ransomware WannaCry Attacks?
May 15th, 2017

Invisible Phishing Attack

Invisible phishing attack is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels. An Information...

Invisible Phishing Attack
May 3rd, 2017

Use Cases of Blockchain in IoT

IoT has been successfully proving itself in enterprises that has adopted it. Generally, all IoT devices even the nearby ones are connected to each other over the centralized internet. The diversity of ownership between cloud and IoT devices, brings complications in device to...

Use Cases of Blockchain in IoT
April 26th, 2017

Top 4 Use Cases of Application Visibility and Control (AVC)

In today’s world when we seek for IoT, IoE, cloud computing, IaaS and various other things, being aware of application is a necessity. When we consider a network system to be deployed for home, enterprise or on a more global...

Top 4 Use Cases of Application Visibility and Control (AVC)
March 9th, 2017

MEET OUR BLOGGERS

Follow Us

facebook twitter linkedin google plus youtube Glassdoor

Category

Recent Tweets & Comments

Tweets by @AltenCalsoftLabs