The Dangers of Whaling – the Evolution of Phishing

|
In this blog, we will examine the common practice of email phishing and how this technique has evolved into corporate whaling - as well as covering what you can do to ensure your company doesn't fall victim to such an attack ... Read More

Social Engineering: Media Manipulation

|
In this post, I will examine an old-school technique for media manipulation using social media, and delve into how these sorts of tricks still persist today ... Read More

Social Engineering, Photos and Extortion

Social engineers routinely obtain sensitive and private information and images by illicit means, which they then use as bait to extort private individuals. Help to protect your employees from falling victim to social engineering by raising awareness of this growing issue ... Read More
Goodware vs. Malware

Goodware vs. Malware

In the world of security, you have many free tools available online to help you make difficult decisions. Unfortunately, threat actors have access to the same resources, and may use them to make more effective malware. Here, we examine why using free online AV scanning tools may give you a ... Read More

Security is a Weak Link Sport

Security, like soccer, is a ‘weak link’ sport. You are only as good as your weakest player. For most malicious actors, cybersecurity is a game and the difference between winning and losing is the big payout ... Read More