Cybersecurity
What Is Business Email Compromise (BEC)
What is BEC (Business Email Compromise) Business Email Compromise, or BEC, is a type of cybercrime where scammers use email to trick the recipient to either send money or divulge…
Read moreFAQ: What is data security and why is it important?
As the severity and frequency of cyber attacks continues to increase, data security is becoming a major concern for home users, businesses and governments alike. By 2025 it is predicted…
Read moreThreat Advisory – Critical PaperCut vulnerability being actively exploited
What is PaperCut MF & MG? PaperCut is a piece of software that allows one to manage and minimize printer waste as well as print in a sensitive documents in…
Read moreThreat Advisory – EvilExtractor Malware Spikes In Europe and US
Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…
Read moreHow To Report A Security Vulnerability Responsibly
Proper disclosure of vulnerabilities is crucial to ensure hackers do not start to exploit end users using the vulnerability in question. It is important that when a vulnerability is found it…
Read moreOpinion: Cybersecurity for everyone
Cybersecurity companies mainly focus on large enterprises. This leaves those residential clients, micro, small and medium enterprises potentially not able to afford proper cybersecurity solutions. It is rather unfair that cyber…
Read moreCritical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked
Google is urging users to immediately update chrome due to a critical zero day vulnerability that would allow your device to be hijacked. This security flaw currently in the wild,…
Read moreCyberwarfare – The Evolution Of War, From The Real World To The Virtual World
I am subscribed to a large number of cybersecurity-related blogs and mailing lists and the amounts of varying attacks that I see on a daily basis leaves me in awe,…
Read moreSigns To Watch Out For If You Suspect An Email To Be A Phishing Email
One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…
Read more