Jeff Bezos and the WhatsApp Security Flaw

Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.

Remote Access Trojan (RAT)

A Remote Access Trojan (RAT) is malware that includes a backdoor for administrative control over the target computer. These trojans are typically installed in the background, invisibly, with a user-requested …

trojan horse cybersecurity breaches

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting …

Worm

A worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. Source: CNSSI 4009 If you would like to learn more about this topic, watch this …