cybercriminal

Pay Attention to distributed spam

Introduction A lot of people get a handful of spam in their email inboxes every day. While spam can be a nuisance, it only takes a few minutes to delete or block spam. But if you receive tens of thousands … Read More

HTTPS: Why it matter?

Introduction Internet browsing is done  by millions people on a daily basis.  People browse the internet for various reasons, look up info, shopping or other recreational activities.  Internet browsing has become second nature to us, so much so that we … Read More

What you need to know about VoIP phishing

Scammers have found a way to exploit vulnerabilities in VoIP (Voice over Internet Protocol) via a scam called vishing. This scam works much like any phishing attack: a scammer purports to be a legitimate entity and asks the potential victim … Read More

Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills … Read More

4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what … Read More