Category

Cyber Threats

Top 5 Cyber Security Threats Today

The usual landscape in cybersecurity has been changed by the pandemic, the political turmoil and other factors. Are we experiencing a change in trends and methods of attack too?

December 15, 2021
keep reading
What is Phishing and How to Prevent It

If you're thinking "that's just spam, right?" you couldn't be more wrong. Make sure you know what phishing and spear-phishing look like to avoid falling for it.

November 29, 2021
keep reading
Threat Detection and Prevention | Your Guideposts to Staying Safe

Threat detection is a critical aspect of cybersecurity protection today and is essential to minimize damage and financial loss to both the business and customers alike. The first place to begin is by really understanding what threat detection is.

November 29, 2021
keep reading
Cerberus and Alien: the malware that has put Android in a tight spot

The most complex Android malware in recent years has released its source code and malicious actors have their own forks, strongly motivated by financial gain. Is 2020 the year of smartphone malware?

September 29, 2020
keep reading
The Equifax Data Breach: What Did We Learn About Our Data?

The worst data breach of the last half of the decade had deep consequences. What did we learn in terms of security and privacy of our data?

July 10, 2020
keep reading
Recent Data Breaches and How to Protect Yourself

Billions of accounts and data points have been compromised in the past year, learn how it happened and how to minimize the fallout.

December 7, 2018
keep reading
Data Security: what are DDoS attacks and how do they affect it?

The main reason why these attacks pose as constant threat comes from the simplicity of their execution, the only thing attackers need is to send a large number of requests to a server until it can’t handle them anymore.

April 6, 2017
keep reading
Phishing Attacks - How to improve your data security

Phishing is one of the oldest scams in the books. This is why we’ve compiled a list of 7 steps to avoid being a victim and keeping your most valuable information safe.

February 3, 2017
keep reading
Device security: internal threats and how to solve them

Lets take a closer look at the current internal threats that don’t let IT warriors sleep at night, and how to solve them using device management softwares.

January 19, 2017
keep reading