Microsoft’s Latest Attack Ad Rips Into the iPad Pro
Monday, 12 April 2021
It might be 2021, but to someone in Microsoft’s marketing department it may as well be the 1990s all over again. That’s because the Redmond, Washington-based company is slamming Apple products in its new ads—harking back to the time when Microsoft and Apple were headed up by fierce rivals Bill Gates and Steve Jobs, rather
- Published in Malika Karoum Global News
No Comments
Acer Has Been Hit With a $50 Million Ransomware Attack
Sunday, 21 March 2021
Acer has been the target of a REvil ransomware attack, with the attackers demanding $ 50 million from the company to decrypt the data and not leak sensitive information on the web. This makes it the ransom demands ever made by a ransomware group. The REvil ransomware group is one of the most notorious hacking
- Published in Malika Karoum Global News
Homeland Security Declares Microsoft Exchange Attack "Emergency"
Thursday, 04 March 2021
Homeland Security has declared an ongoing attack against Microsoft Exchange as an emergency. The attacks, which began earlier this week, target Microsoft Exchange Servers, stringing together several zero-day exploits to access secure email accounts. Homeland Security: Attack Is “Unacceptable Risk” Homeland Security issued Emergency Directive 21-02 late on March 3, delivering some background information on
- Published in Malika Karoum Global News
Microsoft’s Cloud Services Come Under Attack, Putting User’s Details at Risk
Friday, 25 December 2020
With people’s data slowly moving to the cloud, it’s easier than ever to access someone’s personal information, for better or for worse. Recently, the news broke that Microsoft’s cloud services came under attack, and user details are at risk. What Happened in the Attack on Microsoft’s Cloud Services? The news broke early on Christmas Day 2020 on
- Published in Malika Karoum Global News
What Is a Man-in-the-Middle Attack?
Saturday, 19 December 2020
A man-in-the-middle attack is difficult to identify and defend against. MITM attacks depend on controlling the lines of communication between people, computers, or servers. Man-in-the-middle attacks don’t always require an infected computer, meaning there are multiple avenues of attack. So, what is a man-in-the-middle attack, and how can you prevent yourself from falling prey to
- Published in Malika Karoum Global News
What is a Credential Stuffing Attack?
Monday, 14 December 2020
Credential stuffing is a type of cyber attack that involves ‘stuffing’ stolen credentials into multiple websites. Tools like bots have allowed hackers to automate the stuffing, allowing them to test millions of login credentials against dozens of sites in a short period. Here’s what you need to know about this attack and the simple ways
- Published in Malika Karoum Global News
- 1
- 2