Millions of WordPress accounts targeted in major cyberattack
August 10, 2020
WordPress Cyberattack Attackers exploited XSS vulnerabilities in WordPress themes and plugins to steal database credentials Hundreds of thousands of WordPress websites were targeted over the course of 24 hours in a large scale cyberattack with the aim of harvesting database credentials. The…
0 Comments3 Minutes
Top 10 online scams: Watch out for these common red flags
July 28, 2020
Top 10 online scams Scams aren’t new; they’ve been around for centuries, even millennia. They are used to bilk unsuspecting people or to gain information or power. Nigerian princes want to give you money; Russian women think you’re cute; investment professionals want to let you in on a hot stock,…
0 Comments9 Minutes
How to get protection from Cyber Attacks
July 28, 2020
get protection from Cyber Attacks More frequent reports of data breaches, malware and other cybercrime is prompting corporate IT security managers to react in ways that actually make it more likely their employers will be attacked, according to a report published Nov. 7 by research firm Gartner.…
0 Comments4 Minutes
Fear Makes Cybercrime More Likely
July 27, 2020
Cybercrime Fear More frequent reports of data breaches, malware and other cybercrime is prompting corporate IT security managers to react in ways that actually make it more likely their employers will be attacked, according to a report published Nov. 7 by research firm Gartner. Fear of attack has…
0 Comments6 Minutes
What Is Data Privacy and Why Is it Important?
July 27, 2020
Data privacy has always been important. It’s why people put locks on filing cabinets and rent safety deposit boxes at their banks. But as more of our data becomes digitized, and we share more information online, data privacy is taking on greater importance. A single company may possess the personal…
0 Comments5 Minutes
Clickjacking – What Is It and How To Defend Yourself
July 23, 2020
In a clickjacking attack, the user is tricked into interacting with a UI element that they do not see. The attacker designs a malicious page with carefully positioned visual elements. The user is lured into clicking on these elements but, in reality, unknowingly clicks on an element on a different…
0 Comments13 Minutes
4 Cybersecurity Career Paths (And the Training to Get You There)
July 23, 2020
Cybersecurity professionals work in every size company and industry to protect organizations from data breaches and attacks. And the demand for cybersecurity professionals is growing at a breakneck speed. Job postings for cybersecurity positions have grown three times faster than openings for IT…
0 Comments12 Minutes
Wireless Penetration Testing: What You Should Understand
July 22, 2020
Wireless Penetration Testing Wireless is here to stay and becoming more and more pervasive. Understanding wireless and the risks and vulnerabilities involved with its use are crucial concerns for your organization’s security staff. We have all heard the horror stories associated with a company’s…
0 Comments15 Minutes
What is a firewall and do you need one?
July 21, 2020
A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer. Not only does a firewall block unwanted traffic, but it can also help block…
0 Comments10 Minutes