12 Tips On How To Protect Your Data
Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever
Since the start of the Covid-19 pandemic, the number of cyber attacks on organizations and individuals has exploded. It is therefore more important than ever
How well do you remember your passwords? If you’re like most people, you probably keep forgetting passwords. You might be guilty of reusing the same
Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or
Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and
Quid pro quo is a kind of social engineering attack where a hacker promises a profit in exchange for information that can later be used
A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of
Information warfare, or Infowars, aims to employ information and communication technologies (ICT) in order to harm an enemy country or organization. What is information warfare
What is tailgating? Tailgating or piggybacking is a physical Social Engineering attack where a person seeks to enter a restricted area where they are otherwise
The current conflict in Ukraine is accompanied behind the scenes by cyber warfare. For many, it signals a new era of cyber attacks. But what