Search Results for: PIN Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach... Blog Post October is Cybersecurity Awareness Month October 18, 2021 October is Cybersecurity Awareness Month Cybersecurity Awareness Month was created as a collaborative effort between government and industry to ensure... Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a... Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world... Blog Post What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post Do you know the Debit Card Is The Least Secure Way To Pay? January 4, 2020 According to the Federal Reserves’ 2019 Federal Reserve Payments Study, the total card payments in 2018 had 131.2 billion transactions... Knowledge Center Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash... Blog Post Hackers Could Change Your Vote on the Voatz Voting App February 19, 2020 As the 2020 elections approach, it has now been discovered that hackers can abuse many vulnerabilities to control voting. This... Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP... Blog Post DHS: Cybersecurity Tips While Traveling April 20, 2020 Before You Go Update the antivirus and anti-malware software installed in your devices to the latest version. Patch all your... Blog Post FBI Warning – Avoid Using Free Wi-Fi During Your Travel December 24, 2019 Here is a warning from the FBI that people should avoid using free Wi-Fi networks but phone’s mobile data connection...
Blog Post Over 40 Million T-Mobile Customers’ Data Stolen September 15, 2021 Over the weekend in mid-August, a supposed hacker bragged in online forums about having successfully carried out a data breach...
Blog Post October is Cybersecurity Awareness Month October 18, 2021 October is Cybersecurity Awareness Month Cybersecurity Awareness Month was created as a collaborative effort between government and industry to ensure...
Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post Understanding Authentication April 29, 2020 Authentication is the process of recognizing a user’s identity. It is the mechanism of associating an incoming request with a...
Blog Post Clubhouse Part 1: Does Exclusivity Imply Security? A Look Under the Hood of Clubhouse Authentication February 23, 2021 In this two-part blog post series, we will look at security aspects of the Clubhouse app. Security in the world...
Blog Post What Are the Steps Towards Implementing the Zero Trust Model? January 21, 2021 Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post Do you know the Debit Card Is The Least Secure Way To Pay? January 4, 2020 According to the Federal Reserves’ 2019 Federal Reserve Payments Study, the total card payments in 2018 had 131.2 billion transactions...
Knowledge Center Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools...
Blog Post The Basics of TrickBot Malware July 2, 2020 TrickBot malware is Trojan-type malware to steal sensitive data by using spam emails and also distributed by using Adobe Flash...
Blog Post Hackers Could Change Your Vote on the Voatz Voting App February 19, 2020 As the 2020 elections approach, it has now been discovered that hackers can abuse many vulnerabilities to control voting. This...
Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP...
Blog Post DHS: Cybersecurity Tips While Traveling April 20, 2020 Before You Go Update the antivirus and anti-malware software installed in your devices to the latest version. Patch all your...
Blog Post FBI Warning – Avoid Using Free Wi-Fi During Your Travel December 24, 2019 Here is a warning from the FBI that people should avoid using free Wi-Fi networks but phone’s mobile data connection...