How to defend Against phishing attacks and more
What better way to discuss phishing than an infographic? First: consider the From: field in an email In most emails they make sense – like an email that comes from…
Defend Your Systems
What better way to discuss phishing than an infographic? First: consider the From: field in an email In most emails they make sense – like an email that comes from…
How paranoid should you be when you want to devise methods of defending passwords? If someone accesses your computer (with malware or otherwise) and can now read off the RAM…
So what has happened that I want to make another post about “Cybersecurity News”? Microsoft states they will implement the new CCPA (California Consumer Privacy Act) across the nation by…
First of all what is the alphabet soup: IoT, IT and OT? Internet of Things, Information Technology, Operational Technology are explained best in the sans.org white paper: https://ics.sans.org/media/IT-OT-Convergence-NexDefense-Whitepaper.pdf Operational Technology…
Elements of an Attack: From the article at TechNewsWorld. Social Engineering is equivalent to scammers trying all types of methods to gain information or money. What does it mean to…