Chinese Hackers Deploy New Attack Scheme

Chinese Hackers Deploy New Attack Scheme

These hackers have found new targets, the billion-dollar video games industry to profit with their malicious activities. Online games today involve a lot of coins, tokens and digital currency, which makes it an attractive avenue for these hackers to profit...
The Different Types Of Cyber Attacks

The Different Types Of Cyber Attacks

Cyber attacks are on the rise but many of us think we will never fall prey to them.In this post, we explore the six most common cyber attacks and discuss what you can do to protect your organisation. 1. Malware is a terminology used to describe malicious software. The...
What Is End-to-End Encryption?

What Is End-to-End Encryption?

This phrase has often appeared on the top of our Whatsapp conversation, whenever we open up a new chat. This seems to be a wonderment, as many would assume it would be an alert, as it is stated before we can start getting into our conversation.  Let not fret as these...