Refined methodologies of ransomware attacks

Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when organizations paid a ransom to get their data decrypted, they ended up addit…

May 11, 2023
Read More >>

The WhatsApp of secure computation

A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the intended receiver. This might seem an obvious requirement, but not all so-call…

May 8, 2023
Read More >>

Google Support Passkeys for Password Free Sign-in

Today, online privacy and security are the most important things internet users consider while surfing the web. Keeping their online accounts secure with a strong password is everyone’s top priority. For this purpose, the use of passwords has been the standard method for years. But with the public awareness regarding online security and privacy, it […]

The post Google Support Passkeys for Password Free Sign-in first appeared on Internet Security Blog – Hackology.

May 4, 2023
Read More >>

Wargaming an effective data breach playbook

A well-tuned data breach playbook can provide security teams with a clear roadmap for working through the breach response process. Foreseeing every possible twist and turn of a breach may be impossible, but through extensive wargaming, teams can simula…

April 18, 2023
Read More >>