Are Viruses, Worms, and Malware The Same Thing?

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Viruses, Worms, Malware

Viruses, worms, and malware have somewhat become a buzzword, causally tossed around in conversations related to cybersecurity. However, since these terms are often associated with significant security issues and data breaches, it is crucial to gain better insight into what each of these terms means.  Are Viruses, Worms, and Malware The Same Thing? In common … Read more

Building a Comprehensive Cybersecurity Strategy With Cyber Insurance

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Cyber Insurance

Cyber insurance is an absolute must-have for any business that stores important data online, has a large customer base or deals with valuable digital assets. Cyber professionals check all three of those boxes. This guide demonstrates how cyber insurance plays a key role in building a comprehensive, bulletproof cybersecurity strategy. Types of Cyber Insurance Coverage … Read more

Don’t Take the Bait! Signs You’re Just a Step Away from a Phishing Scam

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Phishing Scams

Phishing is one of the most significant threats in the modern cyber threat landscape. While this threat has been around for a considerable time, it continues to wreak havoc. In 2022 alone, there were more than 500 million phishing scams reported. As part of social engineering tactics, phishing attacks happen in various ways, amongst which … Read more

Investigating iOS Phishing Using Virtualization Technology

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Phishing Attacks

Virtualization became a powerful tool in agile development due to its versatility and capability to deliver solutions quickly. It is no surprise then that security engineers are also turning to this technology, like Corellium, in order to investigate phishing attacks against iOS devices. As phishing attacks become more and more sophisticated – and it’s only … Read more

How To Remain Productive and Keep Your Organizational Data Secure at The Same Time

Author(s):

Ben Herzberg, Chief Scientist and VP of Marketing, Satori

Data Security

The onset of the COVID-19 pandemic has accelerated the shift towards remote work globally. As businesses, organizations, and individuals rapidly adapt to this new way of working, it has become increasingly important to recognize the evolving threat landscape. Cybercriminals are persistently developing new methods to profit from vulnerabilities of remote systems, leading to an increase … Read more

Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile Malware

As mobile devices become an integral part of our daily lives, the importance of understanding and combating mobile malware and threats becomes increasingly critical. Mobile malware poses a significant risk to users, with the potential to compromise sensitive data, invade privacy, and disrupt normal device functionality. This article illuminates the power of mobile malware threats … Read more

7 Strategies for Migrating a Data Center on a Modest Budget

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Migrating Data Centers

Migrating data centers can give a growing business many advantages, including greater efficiency, reduced security risks and improved customer relationships. It’s often a necessary step in a business’s development, but it can be a significant financial burden. Here are seven strategies to help organizations migrate their data centers on a modest budget. 1.     Write a … Read more

Mobile App Reverse Engineering: Tools, Tactics, and Procedures

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Mobile App Reverse Engineering

Mobile app reverse engineering is a process that involves dissecting and analyzing the internal workings of a mobile application to gain insights into its structure, functionality, and security vulnerabilities. While reverse engineering can serve legitimate purposes, such as security audits and app analysis, it is crucial to approach it ethically, respecting intellectual property rights and … Read more