Don’t Take the Bait! Signs You’re Just a Step Away from a Phishing Scam

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Phishing Scams

Phishing is one of the most significant threats in the modern cyber threat landscape. While this threat has been around for a considerable time, it continues to wreak havoc. In 2022 alone, there were more than 500 million phishing scams reported. As part of social engineering tactics, phishing attacks happen in various ways, amongst which … Read more

Investigating iOS Phishing Using Virtualization Technology

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Phishing Attacks

Virtualization became a powerful tool in agile development due to its versatility and capability to deliver solutions quickly. It is no surprise then that security engineers are also turning to this technology, like Corellium, in order to investigate phishing attacks against iOS devices. As phishing attacks become more and more sophisticated – and it’s only … Read more

Switching to a Safer Mobile Security Solution is Critical for B2B Security

Author(s):

Anas Baig, Product Manager, Securiti.ai

Mobile Security

In today’s digital world, businesses are becoming more and more dependent on mobile devices to conduct their operations. From communication and data transfer to managing customer relationships and transactions, mobile technology is rapidly becoming the go-to tool for business operations. Unfortunately, this also means that businesses are increasingly vulnerable to cyber-attacks due to inadequate security … Read more

Revelations From CISA Proves Phishing is a Public Menace

Author(s):

Stu Sjouwerman, Founder and CEO, KnowBe4

Phishing Attacks

A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on the planet. Phishing attacks are growing in volume and sophistication. An estimated 255 million phishing attacks were observed in 2022, a 61% increase over 2021. There’s also a steep increase in spear-phishing attacks, smishing attacks, … Read more

The Rising Threat of Mobile Phishing Attacks: Why Your Organization Needs to Prepare

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Mobile Phishing Attacks

The growth of mobile devices in the workplace has turned mobile phishing into a significant opportunity for malicious actors, and it’s therefore a growing concern for organizations. With mobile phishing, the attacker sends links to phishing websites via SMS messages, where they ask for your credentials. One study estimates that 75% of phishing websites specifically … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

Fortify Your Network Against USB Threats by Implementing Device Control

Author(s):

Sathya R, Product Specialist, ManageEngine

USB devices and device control

How important is it to protect your organization from USB threats? USB devices are a popular choice when it comes to transferring data, but they can pose significant security risks for your organization. The plus points of USB devices are their size and efficiency; however, if these devices aren’t monitored or restricted appropriately, all it … Read more

Even Cyber Pros Fall Victim to Cybercrime and Bad Habits

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Cyber Pros Fall Victim to Cybercrime

Back in January of 2021, you may have seen this eye-catching headline: “Hackers are targeting security researchers”. As it turns out, threat actors in North Korea were luring pen testers and other vulnerability professionals into a trap where a backdoor was installed on unsuspecting researchers’ operating systems. This scheme was discovered by Google’s Threat Analysis … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more