BabaYaga and the Rise of Malware-Destroying Malware

| | Malware Analysis
1. Introduction The team working behind Wordfence (a security plugin for WordPress websites) discovered a new type of malware called BabaYaga. It bears the name of a mythical Slavic creature and... Go on to the site to read the full article ... Read More

Security vulnerabilities of cryptocurrency exchanges

| | General Security
1. Introduction Many experts argue that cryptocurrencies may radically change not only the financial sector but also the way society operates. The reasons provided to support this argument... Go on to the site to read the full article ... Read More

Does the GDPR Threaten the Development of Blockchain?

| | Protecting Privacy
1. Introduction In the last two years, there has been a steady increase in the number of discussions around two important topics. Namely, the new EU law called the General Data Protection Regulation... Go on to the site to read the full article ... Read More

The EU Plans to Adopt a Cybersecurity Certification Framework

| | General Security
1. Introduction At present, there is no EU-wide certification framework that allows suppliers of ICT products to obtain information security certificates valid in all 28 EU countries. For example, if... Go on to the site to read the full article ... Read More

Federal agencies are at high information security risk

1. Introduction Governments all over the world urge private companies to take security measures to protect the personal data of their citizens. For example, the recently adopted EU General Data... Go on to the site to read the full article ... Read More

The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware

|
1. Introduction ISACA, an international association focused on IT governance, has recently released its annual study “State of Cybersecurity.” The study relates to the year 2018 and is... Go on to the site to read the full article ... Read More

GDPR Trolls

1. Introduction Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation proceedings are complex and... Go on to the site to read the full article ... Read More
Loading...

Secure Guardrails