Phishing

npressfetimg-258.png

WFH security: How to protect your remote endpoints from vulnerabilities

https://www.techrepublic.com/article/wfh-security-how-to-protect-your-remote-endpoints-from-vulnerabilities/#ftag=RSS56d97e7

Continue Reading
nprssfetimg-65.png

This Week in Security News: Linkury Adware Caught Distributing Full-Blown Malware and Cross-Platform Modular Glupteba Malware Uses ManageX

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how an adware family known primarily for distributing browser hijackers, Linkury, has been caught distributing malware. Also, read about a newly uncovered strain of the […]

Continue Reading
nprssfetimg-64.png

This Week in Security News: A Look Inside the Bulletproof Hosting Business and Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about how cybercriminals secure their assets and survive in the business in a new Trend Micro report. Also, read about a how cybercriminals are tapping into […]

Continue Reading
npressfetimg-246.png

What is website security – how to protect your website from hacking

https://www.acunetix.com/blog/web-security-zone/website-security/

Continue Reading
nprssfetimg-60.png

The 6 Nastiest Malware of 2021

Malware leaps from the darkness to envelop our lives in a cloak of stolen information, lost data and worse. But to know your enemy is to defeat your enemy. So we peered over the ledge leading to the dark web and leapt. The forces we sought are disruptors – without warning, they disturb our businesses […]

Continue Reading
nprssfetimg-57.png

NIST and No-notice: Finding the Goldilocks zone for phishing simulation difficulty

Earlier this year, the National Institute for Standards and Technology (NIST) published updated recommendations for phishing simulations in security awareness training programs. We discussed it on our Community page soon after the updated standards were released, but the substance of the change bears repeating. “Practical exercises include no-notice social engineering attempts to collect information, gain […]

Continue Reading
nprssfetimg-56.png

3 reasons even Chromebook™ devices benefit from added security

Google Chromebook™ devices could rightly be called a game-changer for education. These low-cost laptops are within financial reach for far more families than their more expensive competitors, a fact that proved crucial with the outbreak of the COVID-19 pandemic at the beginning of last year. During that period, Google donated more than 4,000 Chromebook devices […]

Continue Reading
nprssfetimg-53.png

How Small Businesses Can Avoid Cyberattacks in 2021

Across 2020 – and, most likely, throughout 2021 – the priority of small business owners has been weathering the storm brought on by the coronavirus pandemic. That’s understandable, given the challenges and unique threats from Covid-19. However, the danger posed by cybercriminals has not gone away; in fact, the evidence points to the contrary. The […]

Continue Reading
nprssfetimg-52.png

2020’s Top 10 Phishing Brands

With 2020 behind us, it is now possible to take a look back and analyze the different cybercrime trends that took place in order to be more prepared in 2021. One of the most popular form of cyberattacks is phishing, and as it usually comes in the form of emails from well-known brands, they can […]

Continue Reading
npressfetimg-586.png

Top 5 Cloud security challenges, risks and threats

https://www.itgovernance.co.uk/blog/top-5-cloud-security-challenges-risks-and-threats

Continue Reading

Cyber Security, Stress, Money News 2021