Archive

Archive

The Importance of Bug Bounty Programs

Lately, in the news, we’ve seen a dramatic increase in organizations worldwide using a Bug Bounty model, and there have been some huge results. But what is this program and how does it work? The cybersecurity industry is in a ... »

Preparation is the best defence against a ransomware attack

Imagine how well you’d fare in a cage match with an extremely intimidating opponent. Such a nightmare scenario might seem a bit far-fetched to you. Indeed, it’s highly unlikely you’ll ever find yourself trapped and outmatched in the ring in ... »

Malicious ‘Back to School’-Themed Apps Target Young Users Who Don’t Know Better

Bad actors are constantly looking for ways to target unsuspecting users with malware or other digital threats. To increase the likelihood of a successful infection, these nefarious individuals incorporate holidays, current events and significant dates into their attack campaigns. And ... »

Foundational Controls for Common Attacks

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attacks and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the ... »

A Song of Phishing and Passwords via Cylance

Phishing for Developers Hackers are targeting Chrome extension developers with phishing attacks to hijack control over their extensions in the Chrome Webstore. The phishing attacks are very well crafted to display a replica of the real Google login page and use new ... »