Archives - Hackers


The most dangerous malware of 2022

2021 was, unfortunately, a predictably good year for cybercriminals. With remote and hybrid working solutions gaining popularity, people are using the internet in more ways than ever before, making them ripe targets for cybercrime. In addition, malware that targeted major government infrastructure succeeded with the Colonial Pipeline, which was the victim of a ransomware attack. […]

Delete your ancient WhatsApp messages

Most of us can leave WhatsApp chats hanging around like a gallery no one ever visits. By periodically getting rid of the conversations, you don’t need to see or reference anymore, you’ll prevent any sensitive details from falling into the hands of a thief. They don’t even need to physically steal your phone either – […]

What’s a Zero-Day Attack?

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unidentified to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is ended, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit focused at […]

Zero-day bugs and the importance of regular updates

Zero-day bugs have been a hot topic for cybersecurity in 2022. Google’s July announcement of its fourth zero-day exploit of the year is enough to worry even everyday Chrome users. But are zero-day bugs really cause for concern? Let’s look at what zero-day means, how it’s exploited by hackers and what you can do to […]

Don’t assume you’re safe

It can be easy to shrug off the danger of cyberattack as something that won’t happen to you because you’re just a regular person with a normal life. But if your information ends up in the wrong hands, hackers don’t care. One of the most dangerous threats to cybersecurity is complacency. Be sure to proactively […]

Use Google Analytics to track visitor locations

Your business website may be a convenient backdoor into your systems which hackers could exploit to gain access to sensitive information, or simply hijack your website and hold it to ransom. As hackers will often bounce through VPNs across the globe, you can use Google Analytics to monitor where traffic is coming from and flag […]