Overview of phishing techniques: Fake invoice/bills

Overview of phishing techniques: Fake invoice/bills

| | Phishing
Introduction Invoices can be a costly matter — and not always in the usual sense. Phishers believe that you would have a hard time spotting fake bills, which is why they’re increasingly using them as... Go on to the site to read the full article ... Read More

How to use Windows Recovery Environment

Introduction It’s frustrating when a Windows operating system fails to boot or restarts unexpectedly. Maybe the problem is a corrupted disk or missing files, or maybe you just can’t be sure. ... Go on to the site to read the full article ... Read More

Phishing techniques: Asking for sensitive information via email

| | Phishing
Introduction Email has been a critical part of our everyday communications since the 1990s. Thanks to its affordability and ease of use, email allows users to conduct business deals, stay in touch... Go on to the site to read the full article ... Read More

Industrial Ethernet

| | Industrial Ethernet
Introduction Industrial Control Systems (ICS) are different from conventional IT systems. ICS typically source data from remote sensors and transmit commands to machines for the relevant action to... Go on to the site to read the full article ... Read More
4 Times a Security Breach Was Narrowly Avoided

4 Times a Security Breach Was Narrowly Avoided

| | Security Awareness
Introduction We’ve all heard of prominent companies who have been a victim of a data breach. Little to no attention, however, is given to organizations that narrowly avoided security-shaking... Go on to the site to read the full article ... Read More

What is Malware Obfuscation?

Introduction Malware has been a threat to companies and individuals since the 1970s, when the Creeper virus was first discovered. Since then, the globe has faced threats from hundreds of thousands of... Go on to the site to read the full article ... Read More

Ethical hacking: BYOD vulnerabilities

| | BYOD Vulnerabilities
Introduction With the influx of millennials and rising demand for flexible employment, the transition from using corporate devices to personnel bringing their own devices is having a significant... Go on to the site to read the full article ... Read More

Debugging Basics

| | Debugging Basics
Introduction The journey to coding mastery will come with a few bumps in the road. Some can be easily resolved by taking a closer look at the code. Others, however, give the learning coder the... Go on to the site to read the full article ... Read More
Abusing email rules

Abusing email rules

| | Security Awareness
Introduction For the average email user, setting up rules like automatic email forwarding is a harmless exercise. But for the individual whose role it is to prevent security breaches and achieve... Go on to the site to read the full article ... Read More

Ethical hacking: Top 10 browser extensions for hacking

Introduction When it comes to ethical hacking, one of the critical skills you need to succeed is the usage of various tools to start your penetration testing process. While browser extensions may not... Go on to the site to read the full article ... Read More