Logo Logo Logo Logo Logo
  • Home
  • About
    • Contact Us
  • Secure-K @ GitHub
  • DigitalArx
  • News
    • Press Area
  • Blog
  • enEnglish
    • itItaliano
  • Home
  • About
    • Contact Us
  • Secure-K @ GitHub
  • DigitalArx
  • News
    • Press Area
  • Blog
  • enEnglish
    • itItaliano
Businessmen and employees walking

10 Aug Insider Threats: An Enemy Within

Posted at 09:30h in Business, Security by Mon-K Team 0 Comments
0 Likes

Insider threat is an intentional or unintentional misuse of organization’s data by an insider – an employee, a former employee, a subcontractor or a partner – anyone you have kindly granted access to. While ransomware or cyber attack may sound more scary, the vast majority...

Read More
Computer with ransomware

28 Jul Ransomware: What You Need to Know

Posted at 09:30h in Consumer, Cryptocurrency, Security by Mon-K Team 0 Comments
0 Likes

Your personal files are encrypted. To get the private key and decrypt your files, pay the sum below. Any attempt to remove or damage this software will lead to the immediate destruction of the private key. Sounds scary? Now try to visualise this message on the...

Read More

06 Jul Cryprocurrencies, the Dream of Cyber Criminals

Posted at 11:18h in Consumer, Cryptocurrency, Security by Mon-K Team 0 Comments
0 Likes

Crypto-related exchanges, wallets and regular cryptocurrency holders have long been subjects to cyber attacks, scams and hacks, and 2018 might become “the worst year of crypto losses in terms of assets stolen”. In this article, we will introduce you to the world and work of...

Read More
cryptocurrencies

26 May The dark side of Cryptocurrencies

Posted at 09:00h in Consumer, Cryptocurrency by Mon-K Team 0 Comments
0 Likes

Security. Volatility. Mining. Craze. It is bewildering to observe how much people hear about cryptocurrencies nowadays and how little they admit to understand about them. We have already mentioned in one of our recent articles, that alongside 1 percent of people giving cryptocurrencies their ultimate...

Read More
cryptocurrencies on a computer keyboard

06 Apr 9 CryptoCurrencies facts for beginners

Posted at 18:00h in Consumer, Cryptocurrency by Flavia Piantino Gazzano 0 Comments
0 Likes

1. PAYMENT CAN’T BE REVERSED: YOU CAN’T CANCEL YOUR TRANSACTIONS While making online transactions to buy or sell cryptocurrency, these platforms don’t allow you to recall your transactions. If you have transferred cryptocurrency to the wrong ID then you can only expect to meet that guy...

Read More
data security concept, hand trying to stole passwords

26 Mar Social Media jeopardises data security?

Posted at 13:30h in Consumer, Security by Aditi Srivastava 0 Comments
5 Likes

Have Facebook & Twitter started knowing you more than your best friend? Well! We aren’t surprised with that folks. It was back then, 10 years ago we all “discovered” about social media. However now, social media runs a remarkable section of people’s social lives.With hackers being...

Read More
desperate person in front of several computer after WannaCry attack

21 Mar The rise of cyber crime

Posted at 13:30h in Consumer, Security by Flavia Piantino Gazzano 0 Comments
0 Likes

Cyber crime is a criminal activity that involves a computer or digital media and a network – in most cases, the Internet. The computer may have been used in the commission of a crime, or it may be the target. Cyber crime may threaten a person...

Read More

09 Mar 9 Alarming cyber security facts and stats

Posted at 12:30h in Business, Security by Flavia Piantino Gazzano 0 Comments
2 Likes

THE SCARY TRUTH ABOUT CYBER SECURITY. Today’s cyber criminals are more high-level than you might think. They work quickly and can easily evade traditional detection methods. Unfortunately, the majority of breaches remain undetected for weeks or months, allowing hackers to exploit an organization for an extended...

Read More

22 Feb How to shield online business from cyber attacks?

Posted at 11:50h in Business, How To, Security by Mon-K Team 0 Comments
4 Likes

Nowadays Internet security is particularly important for both business and customer. Every consumer should distinguish whether a site is secured before revealing the confidential information, while every online business owner should implement the preventive security measures in order to keep the sensitive information safe. In addition,...

Read More

23 Jan Cyber attacks: why you need to know about Meltdown and Spectre

Posted at 10:28h in Business, Consumer, Security by Flavia Piantino Gazzano 0 Comments
3 Likes

Meltdown and Spectre are hardware vulnerabilities that allow programs to steal data on the computer. The flow is in the CPU architecture and that's mean Meltdown and Specre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might...

Read More
Get our latest news!
Useful links
  • Press Area
  • Blog
  • Contact Us
Read our Latest Posts
  • 9 Steps Before Buying CryptoCurrencies

    ...

    24 August, 2018
  • Insider Threats: An Enemy Within

    ...

    10 August, 2018
  • Ransomware: What You Need to Know

    ...

    28 July, 2018

Mon-K Data Protection Srl.
P.IVA: IT09625500963 – all rights reserved ©2018

  • Privacy
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Necessary Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.