Common security threats – Zero-Day Attack

The first key to any effective security game plan is knowing what you’re up against. We decided to share some of our knowledge and create for you a set of short, informative but simple blogs where you’ll learn all about ten of the most common threats your company is likely…

Continue Reading

The story of one phishing email

Recently, our office got an email from somebody who claimed to represent a “Seitz Law Firm” in Miami. See the email below: Well, from the first sight, this email looks “Ok,” however, we’ve never had any communication or business with this company. Then, when you notice the email it was sent…

Continue Reading

Cyber Security: WiFi Security

Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and phishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data. Here…

Continue Reading

Critical Vulnerability in Adobe Flash

A critical vulnerability has recently been identified by Adobe in their Flash Player version 23.0.0.185 or earlier. The CVE-2016-7855 vulnerability allows hackers to run malicious code on the affected computer using a Flash file. The existing exploit can potentially grant the hacker the full control over the affected system. Flash…

Continue Reading

Stagefright: is your life companion vulnerable

During the last few days, only the lazy one did not mention the evil Stagefreight vulnerability, allowing vulnerability exploitation just by opening the evil MMS or playing video file prepared in a special way. At the time of discovery, about 95% of all devices were vulnerable. Now the gospel: there…

Continue Reading