The rise of cyber attacks during the holiday season: What you need to know
The holiday season is a time of joy, celebration, and gift-giving, but it is also a time of increased risk for cyber attacks. With millions of people shopping online, using the…
How to check if your internet browser is safe: The best tools you can use
It’s important to stay safe online, and one of the best ways to do this is by ensuring your internet browser is secure. It’s not just about keeping yourself safe,…
The e-Voting security analyzed
Online voting defined Electronic voting (e-Voting) is an alternative way of voting by citizens that can be applied to any voting using electronic methods over traditional ones. The range of…
Zero Trust Security: How it can save your business from ransomware attacks
You’ve probably heard the term “zero trust” security before, especially regarding new user authentication methods. But what does that phrase mean? Zero trust security is an access control practice that…
Cuckoo Sandbox – An interesting tool for malware analysis
Cuckoo Sandbox: Created by Claudio Guarnieri during the 2001 Summer of Code, the community has embraced it as one of the best digital forensics tools. In large part, this is…
The Biggest Cyberattacks of 2022 so far
October is Cybersecurity Awareness Month, and at 4i-Mag, we’ve rounded up the most biggest cyberattacks on record so far in 2022 Cyberattacks are a fast-growing threat to most businesses, organizations,…
Suspected Chinese hackers tampered with widely used customer chat program -researchers
By Raphael Satter and Christopher Bing WASHINGTON (Reuters) -Suspected Chinese hackers tampered with widely used software distributed by a small Canadian customer service company, another example of a “supply chain…
Fake Windows 11 update that can steal your data
Lately, a fake windows 11 update has circulated the internet, which is risking the users’ safety. It is spreading malware that could steal a user’s personal information. The reason why…
Hellenic Post cyberattack, closes down entire Data Center
The cyberattacked started from a zero-day malware installed on a workstation A hacking group attacked the Hellenic Post and managed to shut down the central postal system in Greece for…
Hackers are using Cloud accounts for crypto mining
Hackers are using Cloud accounts for crypto mining according to Google, which has released a detailed report on the issue to warn users. The report, entitled ‘Threat Horizons’, is written…