LATEST ARTICLES

GDPR Phishing Attack With Apple Flavor / Royal Wedding

Social engineering follows seasonal patterns. It's also connected to major events. We see this every year with holiday-themed phishing attacks between Thanksgiving and New Year's Day. We're seeing it...

California’s Congressional Debate Hacked, the Attacker Broadcasts Gay Porn

Posted on May 21, 2018 at 5:39 PM A forum which was to be used for the First Congressional District debate of California was hacked during the debate itself. The hack occurred...

Cybersecurity training for employees still not as widespread as it should be

While training employees will not guarantee complete cyber safety for companies, it could go a long way to making workers more cyber-aware When it comes to wrapping a chain of...

Students Hacked into High School System to Change Grades

Students hacked into Bloomfield Hills High School by exploiting a vulnerability in the system to manipulate their personal grades, attendance and lunch balance information. They hacked into the student’s information system...

How to choose the right e-commerce platform

In e-commerce, there is no one solution that fits every online store perfectly. When it comes to picking an e-commerce platform, there are many aspects of your business that need...

Hackers Distributing Spyware via Comments Section of YouTube Videos

Newly discovered a powerful spyware distributed via YouTube Videos comments sections and the spyware is capable of steal files and other confidential information from infected devices. A Malicious Link that distributed via...

The KnowBe4 User Conference Was A Blast! Here Are Some Quick Impressions

The first KB4-CON 2018 in Orlando was super fun. Customers and Partners that attended walked up to me and said they loved it. Often they said it was the best...

Most Important Web Server Penetration Testing Checklist

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration errors, protocol Relation vulnerabilities.  1.  “Conduct a serial of methodical and...

North Korean Hackers Infect Defectors via Facebook and Google Play

Posted on May 18, 2018 at 2:17 PM A new report published by McAfee researchers claims that Google Play hosted three, or possibly more, Android apps that were used by hackers to...