Social media life after death

In the 21st century, social media is a big part of people’s lives. From sharing photos to job applications to establishing relationships and communicating personal and professional information. Platforms like Twitter, Facebook and WhatsApp are big aspects of modern culture. However, how many people have considered what happens to their social media accounts when they…

A Look Back on Cybersecurity in 2017

  2017 has been quite a year for cyber-attacks, including: Equifax: A breach that led to the theft of personal information for hundreds of millions of US citizens. Shadow Brokers: A hacking group that sold Windows exploits they allegedly stole from the NSA. Google Docs: A sophisticated phishing scam that tried to compromise victims’ email…

Huawei Routers Exploited to Create New Botnet

by Check Point Research Team posted 2017/12/21 A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of thousands of attempts to exploit it have already been found in the wild. The delivered payload has been identified as OKIRU/SATORI which is an updated variant of Mirai. The suspected threat actor behind the…

What Is the difference between a Managed Application Server and Managed File Server?

Depending on the type of business you have, there are different types of servers to cater to your business requirements. There are different types of servers to consider including a managed application server, catering for web applications; as well as a managed file server, offering shared storage of computer files, like documents, images, databases and…

Celebrating Women in IT

Information Technology is an industry that plays a big part in every advancement in the modern age. As the world becomes more digitally sound, reliance on the IT industry increases, creating more opportunities, more career choices, more innovations and more options to connect. Every day, many pioneering women continue to prove that they can be…