Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

ransomware attacks in various industries

7 Industries Where Hackers Are Using Ransomware

Even before WannaCry spread throughout the world at an alarming rate, infecting millions of public and private organizations along the way, ransomware had already taken foothold across various parts of the world since 2012 and has been responsible for disrupting the everyday functions of all types of organizations in various industries. In many cases, the […]

ciso working at business from a window

Why More Companies Are Looking for a CISO

A growing number of web and data threats has companies scrambling to find someone to take charge. Since the birth of computing, there’s been a need for the “IT-guys,” the ones you could call when an issue required technical assistance and would come running to the rescue. But with the dotcom boom of 2000, this […]

Smartest IoT devices

The 10 Smartest IoT Devices to Look Out For in 2017

According to Gartner, we should expect to see 8.4 billion connected devices by the end of this year, a 31% increase from 2016. With an increasing number of businesses jumping on the IoT bandwagon, it seems like every day there is a new connected device out on the market. Even a simple internet search on […]

1484806777641_1_111339 (1) (1) (1)

The Blockchain Hype

With technology advances a-plenty – what’s going to be the next revolutionary technological development? Big data? The Internet of Things (IoT)? Nope. It’s going to be the blockchain With more than 25 countries investing in the technology, and $1.3 billion invested – it looks like individuals, companies, and governments alike are putting their eggs in […]

DDos types include volumed based, protocol, and application layer attacks

Types of DDoS Attacks: Explanation for the Non-Tech-Savvy

When major cyber attacks are made public, we often hear about their magnitude and strength. More often than not, the media is talking about DDoS attacks. Deloitte for example revealed that the year 2016 “saw the first two [DDoS] attacks of one terabit per second (Tbps) or more.” But what does this actually mean? One […]

six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

  These days it’s easy to look at the mountain of cyber crime news out there, and imagine a hoodie-wearing, tech-savvy loner in a dark corner of a room trying to get into a network for information. However, times have changed. It’s not just technology that changes or security measures that evolve. Hackers are also […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.