Be aware of these 20 new phishing techniques

| | Security Awareness
Most of us have received a malicious email at some point in time, but phishing is no longer restricted to only a few platforms. The evolution of technology has given cybercriminals the opportunity to... Go on to the site to read the full article ... Read More

32 hardware and firmware vulnerabilities

| | General Security
Introduction Hardware and firmware vulnerabilities can put your business and your customers’ sensitive data at risk, costing you in diminished sales, reputation loss and penalties. Most of them... Go on to the site to read the full article ... Read More

7 most common application backdoors

| | General Security
Introduction The popular adage “we often get in quicker by the back door than the front” has withstood the test of time even in our advanced, modern world. Application backdoors have become rampant... Go on to the site to read the full article ... Read More

Are dark web monitoring services worth it?

| | General Security
Introduction Chances are that you’ve seen ads for services offering dark web monitoring in the past few months. They promise to explore the dark web for your personal information to see if a hacker... Go on to the site to read the full article ... Read More

Common Malware Behavior

Introduction As malware threats continue to grow in both sophistication and frequency, it is increasingly critical for information security professionals to develop effective mitigation and... Go on to the site to read the full article ... Read More

CySA+: Other certifications (Security+, PenTest+, CASP+)

Introduction For anyone looking to become a cybersecurity analyst, CompTIA’s vendor-neutral CySA+ certification offers a pathway to gain the skills and knowledge needed to lead security operations in... Go on to the site to read the full article ... Read More

Exploring the viability of signature recognition biometrics

| | General Security
Introduction Signature recognition is a biometric modality that stores and compares the behavioral patterns which are integral to the process of generating a signature. Some of the factors that are... Go on to the site to read the full article ... Read More

What are one-time passwords and their pros and cons?

Introduction When you go on a vacation, you’re probably extremely vigilant with the security of your home. You lock all the windows and doors, and even activate the security camera if you have one... Go on to the site to read the full article ... Read More

CyberSeek Career Pathway: Incident analyst/responder

| | General Security
Introduction Have you been seeking a cybersecurity career that puts you at the forefront of intrusion detection and combating cybercrime? If you answered “yes,” then you might find the role of an... Go on to the site to read the full article ... Read More

CyberSeek Career Pathway: IT auditor

Introduction For any organization to compete and survive against other businesses, it has to spend on information technology (IT), which ensures operating efficiency, data integrity and compliance.... Go on to the site to read the full article ... Read More
Loading...