Cybersecurity Updates For The Week 38

As the world goes online and transcends barriers that are not always physically surmountable, there is a parallel force that makes an equal and often more significant leap. This is the progress made by the bad actors who are never tired of inventing new means and ways of getting into our networks and systems, stealing

View Full Post
Phishing Scams Don’t Always Arrive by Email

Phishing Scams Don’t Always Arrive by Email

When you hear the word phishing, you probably think of email. And that’s exactly what the scammers want you to think so you won’t pay attention to their latest delivery mechanism: voicemail. Phishing is generally an email that looks real, but isn’t, in an effort to get you to do something you shouldn’t. Now, fraudsters

View Full Post
A Big Part of the Phishing Problem is You

A Big Part of the Phishing Problem is You

The days of a hacker sitting alone at their computer screen in a dark room probing for network vulnerabilities is a thing of the past. That’s too much work. To penetrate networks today, hackers almost always enlist the help of an inside accomplice: you. What hackers have discovered over the years is that it’s much

View Full Post

Cybersecurity Updates For The Week 37

As phishing attacks take a toll on the internet users, the losses caused thereof only seem to multiply. Phishing attack prevention is the biggest challenge that lies ahead for netizens. Cyber attacks are imminent and so keeping abreast with the newest technology employed by adversaries is vital for anyone who wishes to keep himself safe

View Full Post
New Phishing Exploit Leaves Android Phones Vulnerable

New Phishing Exploit Leaves Android Phones Vulnerable

Got an Android Phone? You’re going to love this. Attackers can now take control of your phone over-the-air. From Check Point Research, “Check Point Researchers have identified a susceptibility to advanced phishing attacks in certain modern Android-based phones, including models by Samsung, Huawei, LG and Sony. In these attacks, a remote agent can trick users

View Full Post

Phishing Attacks Now Coming in Stages

It never ceases to amaze how clever hackers are or how far they’ll go to phish someone. Whenever they find a flaw in their attack methodology, eventually, they figure out a way to overcome it. Normally, a phishing attack will try and lure victims to a website to steal their credentials. The phishing website is

View Full Post

Data Breaches Are Going to Cost How Much by 2024?

Data breaches are big business. Everywhere you turn you hear about another organization getting hit by a data breach. We also know from recent events that recovering from a data breach can be expensive. Whether you choose to pay the ransom like this South Korean web host or resolve it internally like the city of

View Full Post