Home Search
phishing attacks - search results
If you're not happy with the results, please do another search
Mobile Side of Technology Adoption Still Continues to Present a Challenge
India has transformed into a mobile-first economy. The ease of accessibility and cheaper data make these a primary source of entertainment. Given the transition...
The Last 11 Email Accounts You’ll Ever Need
When I was a kid, I watched a lot of terrible action movies. Maybe it was just growing up in the 1980s, and there...
Integrating Ethics with Technology
Tech is not above us. It should be governed by all of us, by our democratic institutions. It should play by the rules of...
“Security patching should be a part of a system’s basic maintenance procedure”
A well-rounded and seasoned leader in the field of IT & Information Security, Ashish Thapar is the Vice President and Head for Security Consulting...
Cyberthreats Still Loom Over E-learning Platforms
The year 2020 is certainly a year of change. The pandemic changed every aspect of our lives, keeping people more connected than ever virtually....
Speed is the Reason Why 1 In 3 Employees Do Not Use VPN
Cybersecurity, digital investigations, and eDiscovery will never be the same. Market uncertainty and changing consumer behavior have increased cybercrime and fraud, while remote workforces...
Information Technology Internal Audit Considerations Amidst COVID-19
The COVID-19 pandemic, as an unpredictable event, has triggered a ripple effect on people, businesses, governments, and society as a whole. Resultantly, organizations resorted...
Saint Bot – A New Malware Downloader Spotted
Security experts from Malwarebytes discovered a new malware strain used in phishing attacks to install credential stealers and additional malware payloads. Tracked as Saint...
97% of Organizations Suffered a Mobile Malware Attack in 2020
The number of threats that our mobile devices encounter increases every year and the risks from mobile malware has a large share in it....
4 Common Attack Vectors You Need to Know
Online adversaries always advance their hacking techniques to enhance their attack vectors. Cybercriminal groups focus on different kinds of cyberthreats such as data breaches,...