Did USB fans given to journalists at Trump-Kim Summit contain spyware?
By in Information Security, on July 3, 2018 at 2:51 pm
Did USB fans given to journalists at Trump-Kim Summit contain spyware?

Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect devices with malware. We got our hands on one to find out.

How to securely erase external hard drives, SD cards, or flash drives
By in Information Security, on June 21, 2018 at 1:01 pm
How to securely erase external hard drives, SD cards, or flash drives

Learn how to securely erase external storage devices, like SD cards, USB sticks, or flash drives using apps for various operating systems.

What is packet sniffing and how can you avoid it?
By in Information Security, on June 20, 2018 at 4:01 pm
What is packet sniffing and how can you avoid it?

Your internet traffic is susceptible to packet sniffing and analysis as it travels through various routers en-route to its destination. We explain how to avoid that.

What is W2 phishing?
By in Information Security, on June 11, 2018 at 10:41 am
What is W2 phishing?

Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attack tries to access a company’s W2 files for all current and/or past employees.

Fileless malware attacks explained (with examples)
By in Information Security, on June 11, 2018 at 7:56 am
Fileless malware attacks explained (with examples)

Malware is malicious software that acts counter to the interests of the computer that hosts it. Viruses, worms, and Trojans are all types of malware. The standard way that a device gets infected by malware is through an executable program copied onto the victim’s machine.

5 courses to learn ethical hacking online
By in Information Security, on June 11, 2018 at 7:44 am
5 courses to learn ethical hacking online

Jumpstart your cybersecurity career with an online ethical hacking course. Ethical hacking is the process of attempting to penetrate computer systems and networks with the intention of locating weaknesses and vulnerabilities (real and potential) that could be exploited by malicious hackers.

What is whaling and how can you spot and avoid it
By in Information Security, on June 6, 2018 at 11:00 am
What is whaling and how can you spot and avoid it

Whaling is a form of phishing. In fact, is it a form of spear phishing. Phishing is an online scam that aims to reap private information from members of the general public, particularly login details for email, payment, and banking applications.

How to secure your home wireless network
By in Information Security, on May 31, 2018 at 4:34 pm
How to secure your home wireless network

Unlike physical networks, wifi systems can extend beyond the walls of your home. Once the password for access gets out in the world, it is very difficult to control who can access your home network. Therefore, you need to consider implementing some changes and routines that protect you from intruders, snoopers, and internet carpetbaggers.

Common phishing scams and how to recognise and avoid them
By in Information Security, on May 29, 2018 at 2:08 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

What spear phishing is (with examples) and how can you avoid it
By in Information Security, on May 29, 2018 at 2:03 pm
What spear phishing is (with examples) and how can you avoid it

Spear phishing tactics use trust to scam victims. Find out more about spear phishing attempts, including some real world examples and tips for how avoid becoming a victim.

Page 1 of 10