The Dangers of Whaling – the Evolution of Phishing

/
In this blog, we will examine the common practice of email phishing and how this technique has evolved into corporate whaling - as well as covering what you can do to ensure your company doesn't fall victim to such an attack ... Read More

The Dangers of Whaling – the Evolution of Phishing

/
In this blog, we will examine the common practice of email phishing and how this technique has evolved into corporate whaling - as well as covering what you can do to ensure your company doesn't fall victim to such an attack ... Read More

Social Engineering: Media Manipulation

/
In this post, I will examine an old-school technique for media manipulation using social media, and delve into how these sorts of tricks still persist today ... Read More

Social Engineering, Photos and Extortion

Social engineers routinely obtain sensitive and private information and images by illicit means, which they then use as bait to extort private individuals. Help to protect your employees from falling victim to social engineering by raising awareness of this growing issue ... Read More

pi Day: Machine Learning a la Mode

Have you ever heard the phrase, 'history repeats itself'? While that may not be universally true, history does often reveal similarities between events. Read on to learn what a malware hash has in common with pi, and how machine learning can predict the future by looking at the past ... Read More

Security and The House of the Rising Sun

We’re currently experiencing an interesting time in the cybersecurity and IT field. The adoption rate of new technologies is increasing and the advancement of the cybersecurity field will soon start to grow even more rapidly. But this can only occur if we don’t continue to make the same mistakes as ... Read More
Goodware vs. Malware

Goodware vs. Malware

In the world of security, you have many free tools available online to help you make difficult decisions. Unfortunately, threat actors have access to the same resources, and may use them to make more effective malware. Here, we examine why using free online AV scanning tools may give you a ... Read More

Security is a Weak Link Sport

Security, like soccer, is a ‘weak link’ sport. You are only as good as your weakest player. For most malicious actors, cybersecurity is a game and the difference between winning and losing is the big payout ... Read More