Search Results for
BEC
Smart camera privacy โ what you need to know
Smart cameras are very handy and make the life of parents easierโ but you must take care to ensure that they are protected from criminals.
How Endpoint Detection and Response gave rise to Threat Hunting
Rather than reactively responding to malware threats, our security analysts are actively engaging in Threat Hunting looking for new threats.
Should you ditch charging cables?
New smartphones now support wireless charging โ should you dump your old charging cables? We take a closer look and the advantages and disadvantages.
Internet scams – why do people keep falling for them?
There is a lot of misinformation on the internet but it is usually quite easy to check if a story is fake – so why do we keep falling for them?
Island hopping: the tactic de rigueur among cyberattackers
Cybercriminals have used a tactic called island hopping to carry out a ransomware attack on 22 local governments in Texas.
CVs, the perfect tool to deliver malware
Security researchers have discovered a new phishing campaign that uses a CV that is sent as an attachment to get deliver a remote access Trojan.
How secure is the new iPhone 11?
The new iPhone 11 series have already become available for preorder on Sept 13th and are expected to start shipping on the 20th.