MakeUseOf

Damir Mujezinovic-Staff Writer for Security

Damir Mujezinovic

Staff Writer for Security

Page 6

About Damir Mujezinovic

Damir is a freelance writer and reporter whose work focuses on cybersecurity and online privacy. Damir has a background in content writing and digital journalism, and has written for various online publications since 2017, with his work being cited by numerous think tanks and reputable media organizations. Outside of writing, Damir enjoys reading, music, and film.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
WordPress vulnerabilities 1
WordPress Plugins and Themes Could Have Vulnerabilities: How to Secure Your Site

WordPress itself might be safe, but the plugins used to maximize your blog's potential might lead to cyberattacks. Here's what you need to know.

Hacker credit card graph juxtaposed against a wallet with bitcoins 1
Echelon Malware Targets Crypto Wallets: Here’s How You Can Protect Yourself

This malicious software is hard to detect, steals login credentials, and takes screenshots of target devices. Here's what you need to know.

North Korean dictator Kim Jong Un graphic with crypto logos in background 1
SnatchCrypto: Why Are North Korean Hackers Targeting Crypto Startups?

The hacker group, BlueNorOff, is attacking cryptocurrency companies. Here's all you need to know about North Korea's SnatchCrypto hacking campaign.

An elephant and a beetle juxtaposed against a screen with graphs 1
Elephant Beetle: Stealthy Hacker Group Stole Millions Undetected

A malicious group dubbed 'Elephant Beetle' uses stealthy measures to steal millions of dollars. Learn everything about them and stay protected.

Uber app is seen on a smartphone with a lock 1
Uber Suffered Major Breaches: Take These Steps to Secure Your Account Now

The popular ride-sharing app has suffered numerous data breaches in the past. So how can you keep your Uber account and data safe?

MikroTik router  1
Cybercriminals Are Weaponizing MikroTik Devices: Here’s How

Do you use a MikroTik router or wireless ISP device? It could be vulnerable to cyberattacks. Here's how to protect yourself.

Graphic illustration of a hacker juxtaposed against a gavel 1
How to Police Hackers: Inside the Dark Web’s Justice System

If two cybercriminals have a dispute, how can the disagreement be settled? Even the dark web has a justice system...

Floppy disc with words  1
AIDS Trojan: The Story Behind the First Ever Ransomware Attack

Ransomware is a huge problem now, but what was the very first example of ransomware? How was it deployed? And who created it?

Wrench and lock are seen on a laptop screen, drawing 1
PayloadBin Ransomware: Everything You Need to Know

More and more cybercriminals are favoring ransomware as a form of attack. Here's what you need to know about the latest variant.

Digital illustration shows a laptop screen with a shield and needle on it. 1
Researchers Catch the AllBlock Adblocker Injecting Ads: Here's What Happened

Imperva Research Labs found an ad blocking extension had duplicitous purposes too. Here's what we can learn from this shocking example.

A poke ball is seen next to a smartphone  1
The ShinyHunters Hacker Group Collects Data Like Gamers Collect Pokémon

These cybercriminals have hit major companies. You might've even seen their logo: it's the Pokémon, Umbreon. Here's what you need to know.

Screenshot shows blurred MS Word files juxtaposed against the word  1
WastedLocker: A Complex Ransomware Variant That Targets Large Corporations

This strain of ransomware (and its Hades variant) has targeted countless high-profile companies, including Garmin. Here's what you need to know.

Folder and file icons with a question mark are seen on a blue background 1
Downloaded a Suspicious File? Here’s How to Check if It Contains Malware

Accidentally downloaded a file you suspect might be a virus? Or what if you think a link goes to a malicious site? Here's what to do.

Monitors with Android logo seen before a human eye 1
Monitoring Software pcTattleTale Accidentally Leaks Phone Screenshots

Stalkerware can be used to keep track of employees, family members, or anyone else. And this data can be accessed by cybercriminals too...

Android icon juxtaposed against computer code 1
GriftHorse: A New Trojan Stealing Millions of Dollars From Millions of Android Users

Have you received an unusual notification saying you've won a gift? It might be GriftHorse, a new Trojan.

Illustration of a spammy website riddled with warnings and ads 1
Seeing NSFW Ads on Government Sites? Here's Why

Stumbled across unsuitable adverts on US government websites? You're not alone, but why are spammy adult ads appearing on govt sites?

Digital illustration of trojan horse malware. 1
Here's What You Need to Know About the Dridex Trojan Horse

It's been described as the most prevalent malware in the world. But what is Dridex? And how do you protect yourself?

Digital illustration of the Guy Fawkes mask. 1
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups

Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?

A USB stick is plugged into a laptop. 1
Hackers Bribe Employees to Deploy Ransomware on Company Computers

Hackers are finding new ways to infiltrate businesses: using insiders to cripple companies using ransomware.

Photo concept meant to illustrate invasive surveillance. 1
The Reality of Employee Surveillance Software for Remote Workers, Explained

More and more employers are using employee surveillance software to keep tabs on workers. Is this just a temporary fad or permanent trend?

4 5 6 7
Page 6 / 7