Malicious URLs and How to Fight Them
URLs are integral to using the internet. Operating bank accounts, using social media, file storage, and reading your favorite blog involves URLs. Due to the ubiquity of URLs, many people don’t pay attention to security before clicking them. Hackers take advantage of this fact to create harmful links to compromise users’ information or system when...
Recent Cyber Security Breaches: Microsoft, Panasonic and More
The Evolving Threat of Cybercrime as a Service
A popular business model in the IT industry is the offering of various software and infrastructure as a service to customers who may not have the finance or expertise to set up such a system. Some applications of this model include software-as-a-service and platform-as-a-service which are widely used by various businesses to simplify their...