Chief Operating Officer at Growth Bite
Adomas Šulcas
Adomas is a technical writing expert who founded Growth Bite, a digital marketing company, focused on providing high-value SEO and content marketing services to SaaS companies.
40 articles published by this author
5 min read
How to Get Free Wi-Fi: Apps, Hotspots, and Safety Tips
Key takeaways:
If you ever traveled abroad or simply went outside and forgot that you’re out of mobile data, you probably felt a need to find free Wi-Fi somewhere. Being stranded without internet can be stressful, especially if you’re in a hurry and don’t know where to go without a GPS.
To help you forget this stress, we put together this guide that will explain how to get free Wi-Fi quickly. After reading, you will know about the best places to find it, the best apps to use, and how to remain safe on public Wi-Fi networks.
Adomas Šulcas
9 min read
How to Detect and Protect Against Pegasus Spyware?
A cybercriminal isn't always a loner writing code in his mom's basement. Often, malicious software is created by multimillion-dollar corporations with their own LinkedIn profiles and Wikipedia pages.
Such is the NSO Group, the developers of the notorious Pegasus spyware. This software can extract a wealth of data from the victim's smartphone - conversations, chats, photos, geo-location, without them even falling for a phishing attack.
The company positions itself as fighting terrorism but has been listed as a threat to the US, and, reportedly, Pegasus spyware was used against journalists and activists. The lines between proper and improper spyware are becoming blurry. What can we do to avoid it being used against us?
Adomas Šulcas
4 min read
What is FBI Honeypot: Understanding Privacy Implications
An international law enforcement team has successfully arrested hundreds of criminals and seized their illegal assets. All thanks to an allegedly encrypted messaging app with data collection backdoors for the FBI.
That's where the name FBI honeypot comes from. But while effective in catching criminals, honeypots raise important privacy and security concerns.
After such a precedent is set, how can anyone be sure he isn't falling for a honey trap even without any criminal intentions?
Adomas Šulcas
4 min read
pDoS Attacks: What They Are and How to Prevent Them
Denial of Service (DoS) attacks disrupt access to networks or services. But a more harmful variant is pDoS, or Permanent Denial of Service. Unlike other DDoS attacks that flood the target with huge amounts of internet traffic, a pDoS attack can permanently damage hardware.
Understanding Permanent Denial of Service is crucial since these types of attacks target the hardware layer, not just software. In this blog post, you will learn how a pDoS attack works and how to prevent long-term damage and costly recovery.
Adomas Šulcas
6 min read
Understanding Threatware: Detection, Prevention, and Response
Threatware is an umbrella term that encompasses all types of malware, spyware, and other malicious programs. While it used to be only disruptive to regular operations, many new threatware programs also intend to steal information for monetary gain.
Current iterations of threatware can take many shapes and forms, from malicious websites that inject code to email attachments. Staying up to date with all of the newest developments in threatware is partly the job of cybersecurity professionals, however, everyone needs to know the basics.
Adomas Šulcas
4 min read
Ethernet vs Wi-Fi: Which One is Better?
Ethernet and Wi-Fi are the two main ways to connect your computer to the internet. While Wi-Fi has received significantly more attention in recent years, especially among consumers, due to its simplicity and flexibility, ethernet is still widely used in various other applications.
Even if Wi-Fi is significantly more popular, it isn’t strictly better. Both methods have their benefits and drawbacks. Wi-Fi’s popularity comes from its ease-of-use and flexibility, but an ethernet connection can be much more useful in certain scenarios.
Adomas Šulcas