
The two terms often cause confusion to many people. Each of the practice is critical in ensuring the security of the systems. The two processes are requirements or recommendations required by bodies such as PCI DSS and ISO 27001. Pen testing is mainly used in identifying the security threats within the architecture of systems and […]
WannaCry began infecting computers around May 2017, being downloaded onto windows machines and consequently encrypting the files it needs to run. While this form of infection is not new, the absolute scale of WannaCry leads it to be breaking news in most countries across the globe, especially the United Kingdom where it resulted in the […]
Definition Today, malware is one of the biggest threats on the internet. It is an abbreviation for malicious software. Malware is any software that has been developed by cyber attackers with the intention of damaging a computer or a network. In most cases, the owner is not aware of the compromise. Apart from destroying the […]