Blog

You may have heard of a cybersecurity framework – or several, actually – being adopted by large organizations (businesses, NGOs and other entities) or by state actors. But what is a cybersecurity framework, why are there several such frameworks and how do they work?   We’ll answer all these questions and more in the following guide. We noticed that the info on cybersecurity frameworks available online is...

Read More

In a previous guide, we’ve covered the elusive topic of iPhone malware: if it exists or not and how to handle it if you’re among the few users to get infected with one of its versions. When it comes to Android malware, things are much simpler: everyone knows that numerous forms of Android malware exist, so there’s no need to establish its existence first. But since...

Read More

iPhone malware tends to be rarer overall compared to the malware strains which are targeting Android-based smartphones. That’s because iPhones are more expensive and thus benefit from better protection, updates and support from Apple, the company which issues them. But although not so common, iPhone malware is not unheard of. Furthermore, the strains of malware which do manage to infect iPhones are all the more dangerous,...

Read More

Smart objects and smart homes are shifting from a fun project to be presented at tech shows to a more common reality, worldwide. At the same time, as we all know, malicious threats are becoming more advanced and harder to keep at bay through legacy security solutions like anti-virus software.   But while other pieces of technology are striving to keep up with the threatscape and strengthen...

Read More