143 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
Kronos, the banking Trojan created by the “hero” who stopped WannaCry
In 2017, the hero who stopped WannaCry was arrested by the FBI for creating Kronos, a piece of malware that stole bank details from people all over the world.
How to Identify a Business Email Compromise Attack
Business email compromise attacks have skyrocketed over the last few years. Hackers use this strategy to target corporate or publicly available email accounts of executives…
Cyber-criminals invent a new “no talk” scam to trick you
Traditional phone scams involve someone trying to talk you into handing over passwords – but that’s just changed
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.
SIM Hijacking Explained
What is SIM hijacking and how do they do it? SIM swapping is essentially the process of hackers activating your number onto a SIM card of their possession.
What Is Doxxing? How It Works + How to Protect Yourself
Doxxing is a type of cyberbullying that exposes your personal information, like your address or phone number. It’s malicious and can be extremely harmful to…