What is Social Engineering? Tactics, Techniques, and Prevention

Social engineering is a technique used by malicious hackers to obtain information, data, or access from the victim. Social engineering is also referred to as "human hacking". The hacker will often use a variety of techniques to get the victim to provide them with this information, such as authority level, fear, greed, or friendship.

Read Story

What Were The Most Common Phishing Emails of 2020?

One of the most common ways that hackers are attacking businesses nowadays is via phishing emails. These look just like regular emails, but they contain either a link to a hacked website that steals personal/company data or they have a compromised attachment filled with viruses. Here were the most common phishing emails of 2020

Read Story

How To Spot A Phishing Email

Phishing emails can be very dangerous for yourself or your business. Through these attacks, a hacker will have access to your personal information, passwords and then he can either use it to cause harm or sell it to the highest bidder. You need to find the right way to identify a phishing email, and that alone can be troublesome for most people nowadays.

Read Story

Phishing vs. Spear Phishing - What's The Difference?

Phishing and spear-phishing sound very similar, but there are multiple differences between these types of cyber attacks. These are both designed to acquire confidential information, however, the tactics used and the approach is very different.

Read Story

Can You Spot a Phishing Email? Take our Quiz to Find Out!

Can you spot a phishing email? Take our new Phishing Test and find out! In case you missed it, we have a new interactive phishing test live on the website. The quiz contains screenshots of 10 emails, and your job is to determine whether they are real emails or phishing emails.

Read Story

Ransomware Attack Shuts Down US Gas Pipeline

The Department of Homeland Security (DHS) revealed that an American natural gas facility was prompted to halt operations for two days after discovering it was infected with a commodity ransomware.

Read Story

Never miss a post.

Enter your email below to be added to our blog newsletter and stay informed, educated, and entertained!
We will never share your email address with third parties.