GDPR Has Launched – 7 Steps to Compliance

Posted by & filed under List Posts.

Juggling security to protect sensitive customer data - GDPR compliance steps - General Data Protection Regulation

While there are borders between nations, the world is integrally connected. That is perhaps nowhere more evident than in the marketplace of the Internet. The interconnection that the Web allows also means that security is a huge priority, since no one wants anyone who is unauthorized accessing their confidential data. Sometimes legislation will be passed… Read more »

What is Hajime, and Why Should Mirai Care?

Posted by & filed under List Posts.

Hajime Versus Mirai

A malware strain called Mirai is created that amasses a botnet through exploitation of unsecured Internet of Things devices. As the number of zombie devices continues to build, the people behind the malware start to use it in distributed denial of service (DDoS) attacks. Eventually, Mirai really puts itself on the map by launching an… Read more »

Meaner Than Mirai? Meet the IOT Botnet Persirai

Posted by & filed under List Posts.

IOT Botnet Persirai

Is your CCTV camera staying with the fashionable DDoS trends, switching out its botnet malware like it’s changing its outfit? The rise of more sophisticated and malicious IoT botnet malware is certainly not a laughing matter when these powerful criminal technologies are used to take down websites and online services. However, the rise of other… Read more »