Why Your Employees Need to be Aware of Phishing

phishing attacks

Despite major advances in intrusion detection tools and anti-malware technology, businesses are still frequent victims of cyber-attacks. This is largely due to one element that hasn’t evolved as quickly as technology, which is the employee. This makes phishing an extremely popular way to attack a business and obtain sensitive private information. A 2019 report by Verizon found that about a third of all cyber-attacks involved phishing. All one needs to perform a successful phishing attack is a computer, a grasp of the language and an unsuspecting victim. This is why,…

Read More

Cyber Attacks Don’t Die, They Evolve

cyber attacks

Cybersecurity often feels like taking one step forward and two steps back. An attack will appear, the security community will respond, and eventually the threat will be eradicated. Then, a few months down the road, the threat reappears in a newer and stronger form. Most commonly, it’s evolved to specifically bypass the defenses created to combat it. This has always been true of cyberattacks. The earliest hackers searched for ways to tweak or re-purpose code after encountering a new defense. Or, rather than search for new vulnerabilities, they found new…

Read More

QR codes are being used for fraudulent purchases

QR codes cyber crime

This use of quick response codes remains rare, but it is clear that it presents a new security threat. Cyber thieves have now opened up a new channel that allows them to make purchases in the name of innocent consumer victims, and they are doing this through the use of QR codes. These barcodes are becoming increasingly commonplace in marketing as well as mobile payments. The first case of this use of QR codes to make fraudulent purchases was in Pima County, Arizona. It remains limited to this single case,…

Read More

Advances in technology put a strain on mobile security

Mobile commerce growth global world

Technology is becoming more important, and so too is security As technology becomes more prolific in the lives of people all over the world, so too is crime. Many people are beginning to rely heavily on their mobile devices in their daily lives. These devices are being used for social networking, shopping, and managing finances as well as other activities. With dependence on mobile technology rising, malicious groups are beginning to target the mobile space, taking advantage of the lack of security that can be found therein. In Dubai, the…

Read More