Penta Security’s

Cyber Security Blog

Bringing you the trending topics and news of the IT-security industry.

1484806777641_1_111339 (1) (1) (1)

The Blockchain Hype

With technology advances a-plenty – what’s going to be the next revolutionary technological development? Big data? The Internet of Things (IoT)? Nope. It’s going to be the blockchain With more than 25 countries investing in the technology, and $1.3 billion invested – it looks like individuals, companies, and governments alike are putting their eggs in […]

DDos types include volumed based, protocol, and application layer attacks

Types of DDoS Attacks: Explanation for the Non-Tech-Savvy

When major cyber attacks are made public, we often hear about their magnitude and strength. More often than not, the media is talking about DDoS attacks. Deloitte for example revealed that the year 2016 “saw the first two [DDoS] attacks of one terabit per second (Tbps) or more.” But what does this actually mean? One […]

six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

  These days it’s easy to look at the mountain of cyber crime news out there, and imagine a hoodie-wearing, tech-savvy loner in a dark corner of a room trying to get into a network for information. However, times have changed. It’s not just technology that changes or security measures that evolve. Hackers are also […]

blog-cover-image

Tax Season: Cyber Security Defenses to Make (and Keep) Your Returns

It’s that time of year again – the time of the year where winter coats are abandoned, flowers are in full bloom… and everyone starts to rack their brains for how to deal with their taxes from the last fiscal year. Tax season is a stressful time for most and, whether you hire an accountant […]

Data breach on laptop with warning sign

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely must disclose details of any internal breaches they may have suffered. In reality, the majority of data breaches go unreported, and details of the leak are rarely revealed to the public. Recently in the media, Yahoo came under fire and heavy scrutiny for late disclosure […]

hearts on valentine's day

Love in All the Wrong Places: the Dangers of Online Dating

As February 14th creeps closer, hype over finding a valentine is at its peak. But finding a significant other does pose more difficulty in this day and age with the rise of career-driven individuals, slaving away with the chaotic schedules of everyday life. Furthermore, with the digital world just an arm’s length away, it’s not […]

Disclaimer: Unless otherwise noted, Penta Security Systems Inc. is the legal copyright holder of all the material on this blog. Others cannot and should not reprint or publish without Penta Security’s written consent. For inquiries about guest writing or hosting, please contact Penta Security. We reserve the right to change the focus of the blog, shut it down, or chance the terms of use at discretion. All information taken from Penta Security’s cyber security blog and/or applied is at the reader’s own risk. Information is for entertainment and knowledge distribution purposes only. This cyber security blog should not be taken as medical, legal, or other professional advice. Please understand that using any information from the cyber security blog should be done at your own risk. Penta Security does not take any personal or contact information to sell to third-parties. However, we are not liable for the privacy practices of any of our advertisers or blog commentators. When moving from this page to another sponsored page, we are not responsible for any issues. We thank you for your interest in our cyber security blog.