Results for: tech time warp

The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Java cloud migration
Java cloud migration starting to accelerate

Java cloud migration starting to accelerate

Managed service providers can gain insight into the rate at which production applications are moving into the cloud from a survey of 1,800 developers published today by The Eclipse Foundation. The survey finds that half the respondents are running less...

/ April 24, 2018
ransomware protection
The never-ending battle against ransomware

The never-ending battle against ransomware

Ransomware has largely faded from the headlines since WannaCry and NotPetya wreaked havoc across the globe in 2017. In some ways, ransomware creators were victims of their own success. The attacks garnered so much attention that, as Malwarebytes’ Chris Boyd told...

/ February 27, 2018 / 1 Comment
advanced threats
Threat Watch: Resume Files containing Advanced Persistent Threats

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017