[email protected] +603-2181 3666
Extol Threat Intelligent Notification
IT News

The recent tragedy in London has rekindled the debate surrounding privacy in the age of terrorism, specifically in the UK, where Home Secretary Amber Rudd is voicing harsh criticism of end-to-end encryption messaging services. It is believed that Khalid Masood, the terrorist responsible for the deaths of four people on Westminster Bridge, had connected to […]

IT News

Sometimes hackers are not after your banking details or personal information After careful research and conversations with multiple individuals, we have discovered that sometimes hackers are not after your banking details or personal information. It may be tempting for them to steal directly from you but government agencies and antivirus companies are developing fast, and […]

IT News
Exploits: how great is the threat?
April 20, 2017

How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents […]

IT News
Online Privacy Bill Myths Debunked
April 19, 2017

Is your Online Privacy safe? Over the last few weeks, there have been numerous articles from tier one media outlets, claiming the acceptance of the privacy bill will completely remove every bit of online confidentiality away from US internet users. The news made global headlines at the end of March, and it has been a […]

IT News

  As more and more pieces of our environment get connected to the Internet, the number of potential targets of a cyberattack becomes staggering, and the possible consequences become increasingly worrisome. Take what happened recently in Dallas, TX, where most of the city’s population was woken up in the middle of the night to the […]

IT News
Personalized Spam and Phishing
April 19, 2017

Most spam, especially the sort that is mass-mailed on behalf of businesses, has quite an impersonal format: spammers create a message template for a specific mailing purpose and often drastically diversify the contents of that template. Generally, these kinds of messages do not personally address the recipient and are limited to common phrases such as […]

IT News

National elections have become a global stage for hackers to display their virtuosity, bringing the question of cybersecurity to the forefront of the conversation. Since Barack Obama accused the Russians of meddling in 2016’s presidential election in favor of Donald Trump, several European countries have taken their own measures to avoid such cyberattacks. Recently, the vulnerability of […]

IT News

We’re all familiar with the massive data leaks that Yahoo suffered last year. But until recently, we had very little in the way of clues as to who was behind the attacks which started at the beginning of 2014. As more evidence comes to light, it’s becoming increasingly apparent that this is not your run-of-the-mill […]

1 30 31 32 33 34 157