Cybercriminals are constantly searching for methods of penetrating major infrastructure within a country, particularly healthcare systems. Securing healthcare systems is a necessary requirement for governments and…

Cybercriminals are constantly searching for methods of penetrating major infrastructure within a country, particularly healthcare systems. Securing healthcare systems is a necessary requirement for governments and…
A Trojan or a Trojan horse is a malicious software program that can disguise as a legitimate software. Trojans have the ability to control, delete, modify,…
Malware is a malicious software which disrupts or damages computer systems. The technical term malware is derived from the words malicious and software, where the first…
Two broad categories divide cyber attacks distinctively, there are un-targeted attacks and targeted attacks. The necessity of categorising cyber attacks arises from the variation in operation…
A botnet is an internet connected computer system or device which has been infected by a malware specialised in targeting computers through a backdoor exploit. Subsequently,…