
Information Warfare : How Does It Work And How To Protect Yourself
Information warfare, or Infowars, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization. What is information warfare
Information warfare, or Infowars, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization. What is information warfare
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what
Last year, leaks from the Council of the European Union revealed that the European Union was (again) considering banning encryption. More recently, the Belgian government
In recent years, Western countries have become aware of the growing influence of Internet giants on several aspects of political and economic life. One of
If you have read our posts related to social engineering plots (phishing, smishing, whaling and vishing), you already know that many kinds of scams are
It is been more than a month now since Microsoft first acknowledged a data breach on its on-premises Microsoft Exchange Server. Attackers were able to
We have taken many steps to protect our users from common attacks such as spoofing or phishing. However, such emails might still find their way to your inbox. While we do…
A major Internet Service Provider suffered a technical outage on Sunday (30/08/2020). This had a ripple effect and created an internet outage, which impacted sites
TLS is a protocol that encrypts traffic between a client program and the server. It also ensures that the software client is talking to the