article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

From mining cryptocurrency to launching DDoS attacks against networks, there are countless ways in which malware can access and utilize victim’s computers and data. It could be hidden in a malicious advertisement, fake email or illegitimate software installation. Warning signs. NotPetya shook the entire world in June 2017. Trojan horse.