Quadrant360 consulting

Blog

A zero-day is a computer-software vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers, or a network. An exploit taking advantage of a zero-day is called a zero-day exploit …

What is a zero-day attack? Read More »

What is a data breach? A data breach is a security violation, in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage, and data spill. Incidents range from concerted attacks by individuals who hack …

What is data breach and what to do if you are a victim of a data breach Read More »

This week’s blog post will tell you the top 5 tips to securely set up your Wi-Fi router. Router manufacturers know that making their products user-friendly is very important. Most of them come with step-by-step instructions for easy configuration. Apps are replacing manuals to make the set-up process easier for customers, however, the routers maybe …

Top 5 tips to securing your Wi-Fi router Read More »

In this week’s blog post, we will talk about what is cryptojacking and how you can prevent yourself from falling victim to such attacks. WHAT IS CRYPTOJACKING? Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware. One notable piece of software …

DEFENCE AGAINST THE DARK ARTS SERIES: CRYPTOJACKING Read More »

Scroll to Top