About Damir Mujezinovic
Damir is a freelance writer and reporter whose work focuses on cybersecurity and online privacy. Damir has a background in content writing and digital journalism, and has written for various online publications since 2017, with his work being cited by numerous think tanks and reputable media organizations. Outside of writing, Damir enjoys reading, music, and film.
WordPress Plugins and Themes Could Have Vulnerabilities: How to Secure Your Site
WordPress itself might be safe, but the plugins used to maximize your blog's potential might lead to cyberattacks. Here's what you need to know.
Echelon Malware Targets Crypto Wallets: Here’s How You Can Protect Yourself
This malicious software is hard to detect, steals login credentials, and takes screenshots of target devices. Here's what you need to know.
SnatchCrypto: Why Are North Korean Hackers Targeting Crypto Startups?
The hacker group, BlueNorOff, is attacking cryptocurrency companies. Here's all you need to know about North Korea's SnatchCrypto hacking campaign.
Elephant Beetle: Stealthy Hacker Group Stole Millions Undetected
A malicious group dubbed 'Elephant Beetle' uses stealthy measures to steal millions of dollars. Learn everything about them and stay protected.
Uber Suffered Major Breaches: Take These Steps to Secure Your Account Now
The popular ride-sharing app has suffered numerous data breaches in the past. So how can you keep your Uber account and data safe?
Cybercriminals Are Weaponizing MikroTik Devices: Here’s How
Do you use a MikroTik router or wireless ISP device? It could be vulnerable to cyberattacks. Here's how to protect yourself.
How to Police Hackers: Inside the Dark Web’s Justice System
If two cybercriminals have a dispute, how can the disagreement be settled? Even the dark web has a justice system...
AIDS Trojan: The Story Behind the First Ever Ransomware Attack
Ransomware is a huge problem now, but what was the very first example of ransomware? How was it deployed? And who created it?
PayloadBin Ransomware: Everything You Need to Know
More and more cybercriminals are favoring ransomware as a form of attack. Here's what you need to know about the latest variant.
Researchers Catch the AllBlock Adblocker Injecting Ads: Here's What Happened
Imperva Research Labs found an ad blocking extension had duplicitous purposes too. Here's what we can learn from this shocking example.
The ShinyHunters Hacker Group Collects Data Like Gamers Collect Pokémon
These cybercriminals have hit major companies. You might've even seen their logo: it's the Pokémon, Umbreon. Here's what you need to know.
WastedLocker: A Complex Ransomware Variant That Targets Large Corporations
This strain of ransomware (and its Hades variant) has targeted countless high-profile companies, including Garmin. Here's what you need to know.
Downloaded a Suspicious File? Here’s How to Check if It Contains Malware
Accidentally downloaded a file you suspect might be a virus? Or what if you think a link goes to a malicious site? Here's what to do.
Monitoring Software pcTattleTale Accidentally Leaks Phone Screenshots
Stalkerware can be used to keep track of employees, family members, or anyone else. And this data can be accessed by cybercriminals too...
GriftHorse: A New Trojan Stealing Millions of Dollars From Millions of Android Users
Have you received an unusual notification saying you've won a gift? It might be GriftHorse, a new Trojan.
Seeing NSFW Ads on Government Sites? Here's Why
Stumbled across unsuitable adverts on US government websites? You're not alone, but why are spammy adult ads appearing on govt sites?
Here's What You Need to Know About the Dridex Trojan Horse
It's been described as the most prevalent malware in the world. But what is Dridex? And how do you protect yourself?
Evil Corp: A Deep Dive Into One of the World’s Most Notorious Hacker Groups
Evil Corp has carried out several sophisticated attacks since it first burst onto the online scene. But just how dangerous are they?
Hackers Bribe Employees to Deploy Ransomware on Company Computers
Hackers are finding new ways to infiltrate businesses: using insiders to cripple companies using ransomware.
The Reality of Employee Surveillance Software for Remote Workers, Explained
More and more employers are using employee surveillance software to keep tabs on workers. Is this just a temporary fad or permanent trend?