Cyber Attack Number 5/15: Social Engineering

Social Engineering is when hackers exploit human psychology, usually by tricking them into volunteering information which can then be used to gain access to user accounts, identity theft, fraud etc.

There are many different types of Social Engineering. In this post we discuss them and a video that shows just how easy it can be for a experienced hacker to get your info.

Read More

Cyber Attack Number 4/15: Botnet Attacks

Cyber Attack Number 4/15: Botnet Attacks

Short for Robot Network, a Botnet is when a group of computers anywhere in the world are all infected by malware to create a network of interconnected computers that can be used by hackers for numerous types of Cybercrimes.

Learn how to best mitigate your risk of a Botnet Attack.

Read More

Cyber Attack Number 3/15: Drive By Attacks

Cyber Attack Number 3/15: Drive By Attacks

Do you have a WordPress site? Are you sure you’re keeping the plugins updated?

Drive By Attacks

Hackers might exploit a vulnerability and inject a malicious code and more. Visitors to the site might get infected by malware, leading to loss of trust and reputation, and loss of customers.

Read More

Cyber Attack Number 2/15: Phishing and Spear Phishing

Cyber Attack Number 2/15: Phishing and Spear Phishing

It’s a normal day, you receive an email that someone has shared a OneDrive document with you. When you click on the link it asks you to log in to your Office 365 account. You enter your credentials and nothing happens…

You’ve Been Phished

Once you enter your credentials the hackers now have access to your email account. Then they just watch and wait.

Read More