search expand
Skip to content
Security Zap

Security Zap

Cyber Security Done Right – Find out more about cyber security, internet safety, cyber crime, deep web, cyber attack and network security.

  • Cybersecurity
    • Threat
    • Tools
    • News
  • Tech
  • Business
  • Education
  • Home Tech

Category: Cybersecurity

How to Be Safe from Crypto Miners

Posted on April 29, 2018February 26, 2024 by Damien

Cryptocurrency mining has been embedded into websites and web servers lately, utilizing a visitor’s browser as a vehicle to compute mining transactions. It uses unsuspecting…

Posted in CybersecurityTagged Crypto Miners, Safety, securityLeave a Comment on How to Be Safe from Crypto Miners
A mobile phone with the Telegram app in hand against a prohibiting sign

Russia Blocks Millions of IP Addresses in an Effort to Ban Telegram

Posted on April 28, 2018 by Damien

When messaging apps go fully encrypted, it makes it difficult for governments to monitor the conversations. In an attempt to establish control over its citizens…

Posted in NewsTagged Censorship, Internet, TelegramLeave a Comment on Russia Blocks Millions of IP Addresses in an Effort to Ban Telegram

Macro Virus – How It Works and How to Remove It

Posted on April 28, 2018February 26, 2024 by Damien

In order to understand the macro virus and how it works, it’s necessary to first examine what the technology is in the first place. Macros…

Posted in VirusesTagged Computer, Macro Virus, malwareLeave a Comment on Macro Virus – How It Works and How to Remove It

Almost 50,000 Minecraft Users Infected with Malware

Posted on April 26, 2018 by Damien

One of the world’s most popular games of the century, Minecraft, has been hit by a serious cyberattack. Reports claim that over 50,000 of its…

Posted in MalwareTagged Game, malware, MinecraftLeave a Comment on Almost 50,000 Minecraft Users Infected with Malware

Microsoft Outlook Vulnerability Can Allow Hackers Steal Your Windows Logins

Posted on April 23, 2018 by Bruno

Your password to Windows 10 on your desktop/laptop is critical to ensuring your files remain private and cannot be accessed by anyone else. But a…

Posted in VulnerabilitiesLeave a Comment on Microsoft Outlook Vulnerability Can Allow Hackers Steal Your Windows Logins
Business button http icon

HTTP Injectors Being Used by Fraudsters to Steal Internet Access

Posted on April 19, 2018 by Damien

Though most people would expect hackers to come up with new and innovative ways of cheating businesses, very few would have imagined phones with SIM…

Posted in NewsTagged HTTP Injector, Internet, internet AccessLeave a Comment on HTTP Injectors Being Used by Fraudsters to Steal Internet Access

Posts navigation

Previous 1 … 36 37 38 … 112 Next

Search

Recent Posts

  • Deception Technology: How Fidelis Security Helps Enterprises Turn the Tables on Attackers
  • 4 Benefits of Using an AI Text Humanizer
  • Building a Stronger Data Loss Prevention Strategy Through Risk Assessment
  • Beyond Break-Fix: How Modern Outsourced IT Support Drives Business Growth
  • Advantages and Drawbacks of Single Page Applications (SPAs)
security zap logo

All Rights Reserved. © Copyrights 2020 SecurityZap.com

Pages

  • About Us
  • Privacy Policy and Terms of Service
  • Sitemap
  • Sitemap
  • Privacy Policy and Terms of Service
  • About Us