Grey WizardinGreyWizardDdos attacks in Q2 2017Q2 2017, as far as cybersecurity is concerned, compared to the previous years, is not optimistic. How do the statistics of conducted DDoS…Feb 12, 2018Feb 12, 2018
Grey WizardinGreyWizardCyberattacks are more frequently used for manipulating and terrorizingThe extended duration time of attacks and their frequency demonstrate an increasing tendency. The last few months showed that DDoS attacks…Feb 9, 2018Feb 9, 2018
Grey WizardAPI interface vulnerable to cyberattacksA modern technology causes that we are connected with the entire world. The extended network which is the Internet makes that we have…Feb 7, 2018Feb 7, 2018
Grey WizardWhat is bitcoin? All you should know about the most popular cryptocurrencyThe phenomenon of cryptocurrencies has been lasting for a few years. We can describe it as a gold heat of the 21 st century…Feb 5, 2018Feb 5, 2018
Grey Wizard6 things which you should know about botnetBotnet is like flu. It spreads quickly; it attack devices with poor security and causes devastations in the network. It can easily infect a…Feb 2, 2018Feb 2, 2018
Grey WizardHow much does DDoS attack cost us? What influences its price?DDoS attacks (Distributed Denial of Service) are currently ones of the most popular cyberattacks. They are also a profitable activity in…Feb 2, 2018Feb 2, 2018
Grey WizardSelected hacker attacks in 2017In the ideal world nothing threatens cybersecurity. But such a world does not exist. This was confirmed in the first half of 2017 which was…Feb 1, 2018Feb 1, 2018
Grey WizardDDoS attacks in the first half of 2017Cyberattacks are a very serious hazard for companies, institutions and even private persons. Every year there are more sophisticated…Feb 1, 2018Feb 1, 2018
Grey WizardPopular Myths : Big Data, Data Science and CybersecurityData science is a field which currently is more frequently applied in problems which have recently been very difficult to solve. Without…Jan 31, 2018Jan 31, 2018
Grey WizardinGreyWizardGit hackingGit — a version control system. It has plenty of functions which can be used for unethical purposes as well.Jan 30, 2018Jan 30, 2018