Cyber Attack Number 5/15: Social Engineering

Social Engineering is when hackers exploit human psychology, usually by tricking them into volunteering information which can then be used to gain access to user accounts, identity theft, fraud etc.

There are many different types of Social Engineering. In this post we discuss them and a video that shows just how easy it can be for a experienced hacker to get your info.

Read More

Cyber Attack Number 4/15: Botnet Attacks

Cyber Attack Number 4/15: Botnet Attacks

Short for Robot Network, a Botnet is when a group of computers anywhere in the world are all infected by malware to create a network of interconnected computers that can be used by hackers for numerous types of Cybercrimes.

Learn how to best mitigate your risk of a Botnet Attack.

Read More

Cyber Attack Number 3/15: Drive By Attacks

Cyber Attack Number 3/15: Drive By Attacks

Do you have a WordPress site? Are you sure you’re keeping the plugins updated?

Drive By Attacks

Hackers might exploit a vulnerability and inject a malicious code and more. Visitors to the site might get infected by malware, leading to loss of trust and reputation, and loss of customers.

Read More