Metamask credentials targeted by phishing attack
Human psychology is such that a significant number of users receveing this SMS is likely to click on it and mistake the phishing scam website for the real website.
Statistically, the attacker know that a percentage of users will fall for this trap. But what about technology? Can security software prevent this type of attack?
DNS security – Does your firewall need a booster?
As organisations grow and mature, they tend to become increasingly aware of their cyber security needs. In commercial environments, this awareness translates into having at the very least, a firewall installed within the office premises. And today, most companies do at least have a firewall to protect them from malicious websites and cyber-attacks. This brings up the question: why do firewall often fail at preventing ransomware attacks?
Cybersecurity as a Brand Asset?
At the time of writing, a new software vulnerability found on Log4j is disseminating panic among cybersecurity experts. The bug has been given a full risk score 10 out of 10 – for context: only 1.7% of software bugs reach this mark. Amit Yoran, CEO of the cybersecurity firm Tenable, called it “the single biggest, most critical vulnerability of the last decade” – and possibly the biggest in the history of modern computing.
How to stop malware with a URL whitelist?
Cybercriminals are creative agents. They are constantly finding ways to evade detection mechanisms deployed by well-funded cybersecurity research firms like FireEye, Sophos, etc. So far cyberattackers’ creativity is winning this cat and mouse game!
Each time security teams come up with new controls and security measures, cybercriminals find ways to circumvent them and gain access to critical information.
Study Shows 47% of Users Would Compromise Their Computer Security for a Reward
For any business organization, it is not enough to create a secure information architecture. To stay safe, companies must address the human factors that affect cybersecurity. When employees take computer security lightly, they put the organization’s systems at risk.
Browsing online comes with security and privacy risks. Does it have to be this way?
Protecting one’s privacy and security is far from easy while browsing the internet. After all, every single user on the internet is alone defending these assets against, on one hand, tech giants investing enourmous resources to target and track users, and on the other, increasingly professionalised cyber criminals.