{"id":"", "email":"","default_address":null,"first_name":"","last_name":"","name":"" }
{"domain":"andover-consulting-group.myshopify.com" }

All Articles

Anonymous’ cyber war on Russia

Following Russia’s invasion and unprovoked act of aggression against Ukraine, hacker group Anonymous declared “cyber war” on the Russian government. A brief history of Anonymous Originating in 2003 on online image sharing forum 4chan, Anonymous is an international hacktivist collective.  While initially focused on online pranks and humor, Anonymous has become increasingly aligned with social […] The post Anonymous’ cyber war on Russia appeared first on NetworkTigers News.

Read more →


Cybersecurity News week ending 27 Feb 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 28 February 2022. SAN MATEO, CA — Ukraine asks hackers for assistance, Russian websites offline due to cyberattack, CISA: beware of MuddyWater, microchip manufacturer hacked, hacktivist group Anonymous declares war on Putin, Biden administration reportedly considering cyberattacks against Russia, FTC: Americans lost $5.8 billion to fraud in 2021, Russia’s cyberattacks […] The post Cybersecurity News week ending 27 Feb 2022 ~ NetworkTigers appeared first on NetworkTigers News.

Read more →


What a VPN does and does not do

If you’ve been working from home these past few years, or managing a remote team of employees, you might already be familiar with a VPN. A VPN is often seen as the gold standard of remote work, a simple and elegant way to protect private data from prying third parties.  Whether you’re already using a […] The post What a VPN does and does not do appeared first on NetworkTigers News.

Read more →


How to become an ethical hacker

When most people hear the term “hacker” they think of a solitary, shrouded individual, illuminated by the glow of a computer in a dark room as they commit theft and crime via the internet. While in some cases this iconic imagery may ring true, this perception is largely the result of pop culture in the […] The post How to become an ethical hacker appeared first on NetworkTigers News.

Read more →


Cybersecurity News week ending 20 Feb 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 21 February 2022. SAN MATEO, CA — US government cracking down on crypto crime, WordPress plugin exploit could compromise data, major LInkedIn phishing campaigns target those looking for new employment, huge bot attack stopped by researchers, Emotet trojan now spreading via Excel, Ukraine armed forces and banks hit with cyberattack, […] The post Cybersecurity News week ending 20 Feb 2022 ~ NetworkTigers appeared first on NetworkTigers News.

Read more →


Do you really need a VPN kill switch?

A virtual private network (VPN) keeps your online activities safe from prying eyes. It creates an encrypted connection that transmits your data securely through multiple servers. Your original IP address gets masked by a virtual IP that shields your private network. You can even pretend to access data from another geographical location by using a […] The post Do you really need a VPN kill switch? appeared first on NetworkTigers News.

Read more →


How to identify and defend against business email compromise (BEC) attacks

In terms of cybersecurity news, ransomware attacks tend to occupy the majority of the headlines. With their threateningly-named gangs and habit of openly bragging to and about their victims, it’s little wonder that ransomware purveyors hog the spotlight. Business email compromise (BEC) attacks, while far less flashy than ransomware attacks, are more common and can […] The post How to identify and defend against business email compromise (BEC) attacks appeared first on NetworkTigers News.

Read more →


Cybersecurity News week ending 13 Feb 2022 ~ NetworkTigers

Cybersecurity news provided by NetworkTigers on Monday, 14 February 2022. SAN MATEO, CA — “ModifiedElephant” hacking group evades detection for over a decade, Washington state licensing department hacked, report: half of all emails sent in 2021 were spam, Colorado University hacked, over $1 billion in ransomware payments made since 2020, Portugal suffers telecom cyberattack, 25% of new […] The post Cybersecurity News week ending 13 Feb 2022 ~ NetworkTigers appeared first on NetworkTigers News.

Read more →


File server: What is it and how does it work?

With most business and communications conducted online, file servers have become increasingly important, especially for small business networks. As the office filing cabinet was to the 90s, so is the file server to the digital age.  A file server is a centralized location where information is kept and can be shared. It does not have […] The post File server: What is it and how does it work? appeared first on NetworkTigers News.

Read more →


Why do hackers love cryptocurrency?

The last few years have seen a dramatic rise in the popularity and implementation of cryptocurrency both as an investment and through online transactions. As more people have looked to decentralized finance as a bold new economic strategy, the criminals have been quick to advance. Why is it that ransomware gangs so frequently ask for […] The post Why do hackers love cryptocurrency? appeared first on NetworkTigers News.

Read more →