Maximising Security 101: The Ultimate Guide to Secure Configuration Review

“As each organisation’s IT system is different” regardless of how it looks, any mistakes when it comes to the Installation or Configuration of Networks, Servers, and other Infrastructure can cause a ripple effect through your entire organisation. Therein security of network devices is crucial for the operations of an organization. A single compromise may result […]

Do you know how they hacked your account? Part five: Keylogging

Keylogging  (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your keyboard in order to get confidential information about you. Of course they do this in a concealed manner, so that you won’t know you are being monitored while typing passwords, addresses and other […]

Do you know how they hacked your account? Part four: Viruses

In this part we will highlight some of the well-known types of computer viruses Trojan A Trojan horse (commonly known as a Trojan) is a type of malware that conceals itself as a normal file or program to trick you into downloading and installing malware.A Trojan can do many dangerous things to your system, like […]

World’s Biggest data breaches attacks 2016

No one can deny the high impact of technology and its penetration into everyone’s life with its powerful tools to ease our lives and make the world smaller, but we must not forget that it is a double edged sword. Cyber security threats are more sophisticated today than in the past, individual privacy and companies’ […]

Do you know how they hacked your account? Part three: Vulnerabilities

In the first two parts, we focused on the user interaction that may cause infection, but sometimes it is not the user by himself is the problem, it is also the vulnerable system he is using Vulnerability A cyber security vulnerability is a weakness which allows an attacker to undermine your system’s data security defenses. […]

32TB data leak from privacy focused Parler : Jan 2021

Millions of videos, images and text posts collected and saved by a hacker and a team of archivists, from microblogging social network Parler have recently leaked into the public. The dataset leaked is over 32 TB and also includes posts from the January 6 Washington D.C. coup attempt.

Spear Phishing used for Carbanak campaigns

The Carbanak group is infamous for infiltrating various financial institutions, and stealing millions of dollars by learning and abusing the internals of victim payment processing networks, ATM networks and transaction systems. Recently, researchers detected Carbanak campaigns attempting to: Target high level executives in financial companies or in financial/decision-making roles in the Middle East, U.S. and […]

Do you know how they hacked your account? Part one: Downloading the infection

A cyber-attack is classified as any type of offensive action used by cyber criminals to deploy malicious code in your system with the purpose of stealing, altering, destroying, or taking any advantage of this action. Cyber-attacks can target both people and things. ANYWHERE. ANYTIME.  Individual users, computer networks, information systems, IT infrastructure of all types and sizes […]

How you get infected by malware?

Malware (short for malicious software) is one of the terms you’ll hear most often when it comes to cyber security threats. The term defines any software used by cyber criminals to: disrupt computer operations, gather sensitive information, or unlawfully gain access to private computer systems. Malware is characterized by its malicious intent, because it acts […]

Scroll to top

Get Secured Today!

We will get back to you soon.