Attacks

Is That Really You? Phishing Hacks Reach New Heights

Way back in 1792, King Gustav III of Sweden was assassinated while attending a costume party—or “masquerade ball”—in Stockholm. How convenient for the murderer, who could wear any disguise and not be observed after the fact. While those days of anonymity are long gone, it is still possible for malicious hackers to masquerade behind false

[ Read More ]

GRC, The Powerful New Weapon In The War On Hacking

As more hacks, more attacks, more disruption, and more uncertainty take hold of the world, the emerging strategic weapon known as Governance, Risk Management, and Compliance (GRC) is becoming helpful for the good guys. Today, cybersecurity challenges are growing cloudier and more complex by the hour. Simple brute force attacks against individuals and small businesses

[ Read More ]

Here’s Why Your Voice Is The Best Kind Of Password

Our voices are as unique as each individual snowflake that falls from the sky. This distinction is not only based on the shape and size of our vocal cords but also the build of our body and the structure of our vocal tract. All of these components affect the way we articulate speech, create sounds,

[ Read More ]

How Can AI Assist In The Prevention Of Attacks?

The threat landscape is dynamic, and it is fair to say humanity is both intrigued and scared by Artificial Intelligence (AI) as a trusted defense against cyber attacks. From birth, a newborn baby relies on interaction, information, and stimulus to grow and mature mentally, thereby ensuring it progress and overall advancement. AI—sometimes referred to as

[ Read More ]

Gen V—Fifth Generation Attacks—This Will Make You Think

Why don’t you all f-f-f-fade away, talkin’ ‘bout my generation—remember that tune? How magnificent it would be if Gen V attacks would f-f-f-fade away? Then there would be a lot less ‘talkin’ ‘bout ongoing cyber threats and a whole lot more about running business without the incessant fear of compromise. In case you don’t know, Fifth Generation

[ Read More ]

Be Thankful You Weren’t At The ATM When This Happened

Cybercriminals are at it again, and this time they’re hanging out at the ATM. But they’re not stealing from anyone’s bank account directly, just removing all the money the machine is holding. Many ATMs can access up to $20,000 or more in cash, so it’s possible for cyber attackers to grab a lot of dough,

[ Read More ]

WordPress Is King—But Vulnerable—And Not Immune To Attack

If there is a God of the digital world, WordPress might as well be it. It is considered by the masses as the “go-to” tool for website or blog creation—and as an internet platform, it powers a staggering one third to one half of all websites in existence, stealing a substantial portion of market share

[ Read More ]

Hack Email Passwords in Minutes Using Dubious Ways

It is a well-known fact that our oceans are over fished. As if that is not enough, so too are our inboxes. While a different kind of “phishing”, email hacking and scams are increasing with every turn of the tide, most of us count on our email provider to include a level of spam filtering

[ Read More ]

Really, How Safe Is The Camera On Your Device?

These days, we take our mobile cameras pretty much for granted, regardless of whether we’re using our phone, tablet, laptop, or PC—either at home or work—to capture the the special (or even quite ordinary) moments of our lives. We are putting out tons of images each day and often consuming them as well through social

[ Read More ]

Is Your iPhone Making The Bad Guys Rich? You Better Know!

Apparently, some people think iPhones aren’t vulnerable to viruses and other types of malware. This simply isn’t true. Sure, iPhone’s operating system, iOS, has some real security advantages over Android, but that’s not where the story ends. iPhones need to be “jailbroken” if you want to install apps outside of the App Store, which means you

[ Read More ]