Cheat Sheet: 3 Best Tips for Safer Internet Day
Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
Read more...Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
Read more...Ever heard of Franken-phish? It’s a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the Internet, hence the term “Franken-phish.” Read about it in our latest Scam Bucket Article.
Read more...The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production plants today. By isolating both worlds, a Zero Trust approach provides the required security for these environments while still ensuring secure connectivity.
Read more...Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver malware. Read more in our article and the latest Crucialtech podcast.
Read more...elf-righteous, but they are imaginative in looking for new ways to rip you off. That’s why we are launching this special series, Scam Bucket , to keep you up to date on the latest trends in cybercrime.
Read more...Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point and with a good dose of humor.
Read more...Since the introduction of cloud computing it has been touted as a “more secure” option than local servers. As the number of data breaches in the cloud grow, however, that may no longer be the case. Just as in all cases of security failures, human error is at the core.
Read more...“If you’ve received a friend request from me, ignore it. My account was hacked.” heard this phrase? Technically, it’s incorrect: this is not hacking, it’s spoofing. Learn the difference in this article.
Read more...DDoS attacks are one of the most significant cybersecurity threats to emerge. In this article, we will talk about what is a DDoS attack and the botnets that enable this type of cybersecurity threat.
Read more...With everyone of us leaving data traces all over the web, it becomes easier to find comprehensive information about someone online. Doing so with publicly available information is called Open Source Intelligence or OSINT. Cyberprotection Magazine provides you with the tools you need to get started.
Read more...