BlogR

Millions of WordPress accounts targeted in major cyberattack

WordPress Cyberattack Attackers exploited XSS vulnerabilities in WordPress themes and plugins to steal database credentials Hundreds of thousands of WordPress websites were targeted over the course of 24 hours in a large scale cyberattack with the aim of harvesting database credentials. The…


0 Comments3 Minutes

Scam Alert

Top 10 online scams: Watch out for these common red flags

Top 10 online scams Scams aren’t new; they’ve been around for centuries, even millennia. They are used to bilk unsuspecting people or to gain information or power. Nigerian princes want to give you money; Russian women think you’re cute; investment professionals want to let you in on a hot stock,…


0 Comments9 Minutes

Protection from Cyber Attacks

How to get protection from Cyber Attacks

get protection from Cyber Attacks More frequent reports of data breaches, malware and other cybercrime is prompting corporate IT security managers to react in ways that actually make it more likely their employers will be attacked, according to a report published Nov. 7 by research firm Gartner.…


0 Comments4 Minutes

fear cybersecurity

Fear Makes Cybercrime More Likely

Cybercrime Fear More frequent reports of data breaches, malware and other cybercrime is prompting corporate IT security managers to react in ways that actually make it more likely their employers will be attacked, according to a report published Nov. 7 by research firm Gartner. Fear of attack has…


0 Comments6 Minutes

Data Privacy

What Is Data Privacy and Why Is it Important?

Data privacy has always been important. It’s why people put locks on filing cabinets and rent safety deposit boxes at their banks. But as more of our data becomes digitized, and we share more information online, data privacy is taking on greater importance. A single company may possess the personal…


0 Comments5 Minutes

clickjacking attacks

Clickjacking – What Is It and How To Defend Yourself

In a clickjacking attack, the user is tricked into interacting with a UI element that they do not see. The attacker designs a malicious page with carefully positioned visual elements. The user is lured into clicking on these elements but, in reality, unknowingly clicks on an element on a different…


0 Comments13 Minutes

Cybersecurity Career

4 Cybersecurity Career Paths (And the Training to Get You There)

Cybersecurity professionals work in every size company and industry to protect organizations from data breaches and attacks. And the demand for cybersecurity professionals is growing at a breakneck speed. Job postings for cybersecurity positions have grown three times faster than openings for IT…


0 Comments12 Minutes

Wireless Penetration Testing

Wireless Penetration Testing: What You Should Understand

Wireless Penetration Testing Wireless is here to stay and becoming more and more pervasive. Understanding wireless and the risks and vulnerabilities involved with its use are crucial concerns for your organization’s security staff. We have all heard the horror stories associated with a company’s…


0 Comments15 Minutes

what is a firewall

What is a firewall and do you need one?

A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer. Not only does a firewall block unwanted traffic, but it can also help block…


0 Comments10 Minutes