Search Results for: Social engineering Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... Blog Post What is Social Engineering? April 28, 2020 Social engineering is an art to manipulate users and retrieve confidential information. The types of information the attacker seeks with... Blog Post Social Engineering – The Art of Social Hacking February 12, 2020 Social Engineering attack is an art of manipulating people into doing something, rather than by breaking into technical means. These... Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that... Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to... Knowledge Center Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post Beware of Business Email Compromise (BEC) During Tax Season February 11, 2020 Business Email Compromise (BEC) is an advanced email attack that essentially relies on using fake identities to fool victims while... Blog Post 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up... Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero... Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has... Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption... Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...
Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Blog Post What is Social Engineering? April 28, 2020 Social engineering is an art to manipulate users and retrieve confidential information. The types of information the attacker seeks with...
Blog Post Social Engineering – The Art of Social Hacking February 12, 2020 Social Engineering attack is an art of manipulating people into doing something, rather than by breaking into technical means. These...
Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that...
Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...
Knowledge Center Phishing Attack Simulations and Effective Preventative Measures March 25, 2020 Fortification of Your Human Cyber Defenses. The explanation of new and old ways of phishing attacks and recommendations for effective...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post Beware of Business Email Compromise (BEC) During Tax Season February 11, 2020 Business Email Compromise (BEC) is an advanced email attack that essentially relies on using fake identities to fool victims while...
Blog Post 5 ways To Improve Security Awareness Training August 20, 2020 The weakest link of the cybersecurity chain is the user. Therefore, expensive antivirus and software may not always hold up...
Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero...
Blog Post How to Protect Against TrickBot? January 14, 2021 Trickbot is a malware that started life as a relatively straightforward banking trojan. However, as with most malware, it has...
Blog Post Top 5 Blockchain Security Issues in 2019 December 6, 2019 Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanisms, and encryption...
Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...