Tag "Email"

Back to homepage
Software

Taken by Ransomware? Certain Skills Required.

Skull and crossbones adorning a pair of Alexander McQueen boots, um yes, please. Skull and crossbones flashing across my PC, uh no, thanks. While the former speaks of swashbuckling ready-to-wear,

Software

Stop training your employees to fall for phishing attacks

Training your employees how to recognize and avoid phishing only works if trusted emails don’t look the same as criminals’. I recently received an email from an address I didn’t

Identity Theft

70+ common online scams used by cyber criminals and fraudsters

By Jon Watson – A Writer for Comparitech, The internet is the most widely used communication network ever constructed. It’s used by millions of humans and machines every second of

Software

Banking Trojans Replace Ransomware As Top Malware In Email For First Time Since 2016

It has been reported that for the first time since Q2 2016, banking Trojans have displaced ransomware as the top malware in email, accounting for almost 59% of all malicious

Identity Theft

Data Breach Laws are Increasingly Common, do they make a Sufficient Difference?

It’s every consumer’s worst nightmare: You open your email to discover a data breach notice from a company that you don’t even remember creating an account with. You certainly appreciate

Industry Insights

Is the C-suite exempt from cyber-crime anxiety?

If recent cyber-attacks are anything to go by, cyber-criminals are capable of causing colossal damage to organisations of all sizes. With vital public services such as the NHS succumbing to

Software

You Should Be Aware of These 10 Social Engineering Attacks

By Venu Rao, CEO and Founder  at WeSecureApp, Have you ever received an email with no text and just an attachment? We all know about social engineering attacks or at

Software

Scamming the scammers

There is no absolute way to completely eradicate end users’ susceptibility to scams, but with constant care and diligence (coupled with technical measures), it’s possible to provide guidance to ensure

Software

Salted Hash – SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we’re going to see

Industry Insights

Is the C-suite exempt from cyber-crime anxiety?

If recent cyber-attacks are anything to go by, cyber-criminals are capable of causing colossal damage to organisations of all sizes. With vital public services such as the NHS succumbing to