Today’s ransomware is the scourge of many organizations. But where did it start? If we define ransomware as malware that encrypts…
Tag: code
Leaked Babuk ransomware builder code lives on as RA Group
The bones of long gone ransomware group Babuk continue to rattle in the breeze, in the form of reused code. Researchers…
How to set up two-factor authentication on Twitter using an app
If you use text based authentication as an additional level of security for your Twitter account, you may be aware that…
World Password Day: Brushing up on the basics
World Password Day is today, reminding us of the value of solid passwords, and good password practices generally. There are awareness…
Malicious commits found in PHP code repository: What you need to know
You’ve probably heard that PHP’s Git repository was recently compromised, allowing backdoors to be added to the code located there. You…
Explained: SQL injection
Even though SQL injection is a type of attack that is relatively easy to prevent, it is one of the most…