Guides

How to Spot A Fake Email

Coming Soon 7 Essential Tips to Spot a Fake Email Along with the advent of new technologies today, online threats such as cybercrime became prominent. Cybercriminals use email as a platform to continuously do their unlawful activities. Since emails are used for professional and personal communication, attackers and fraudsters prefer to utilise login page online …

How to Spot A Fake Email Read More »

Types of Malware

9 Most Common Types Of Malware And How to Prevent Them

The most common types of malware infections are caused by keyloggers, rootkits, viruses, trojans, worms, logic bombs, ransomware / crypto-malware, spyware & adware, and bots/botnets. Malware attacks can easily be prevented by using anti-malware software providing security awareness training, implementing security policies, installing spam & anti-malware filters, using multi-factor authentication, performing routine vulnerability assessments, and …

9 Most Common Types Of Malware And How to Prevent Them Read More »

digital, hacker, virus

What Is smishing

What is Smishing? One of the many types of phishing attacks is smashing, and it targets mobile devices. Rather than sending phishing messages via email, smishers use MMS or SMS text messages to send these messages to mobile devices. Using mobile devices has become more common for businesses due to bringing your device (BYOD) and …

What Is smishing Read More »

What is spoofing

What Is Spoofing

What is Spoofing? A Definition of Spoofing Spoofing is when someone disguises a communication, such as an email, that comes from a source that is unknown but meant to look like it comes from a trusted, known source. Spoofing can be used with websites, phone calls, and emails, or can be more complex, such as …

What Is Spoofing Read More »