The first key to any effective security game plan is knowing what you’re up against. We decided to share some of our knowledge and create for you a set of short, informative but simple blogs where you’ll learn all about ten of the most common threats your company is likely…
Category: Security
The story of one phishing email
Recently, our office got an email from somebody who claimed to represent a “Seitz Law Firm” in Miami. See the email below: Well, from the first sight, this email looks “Ok,” however, we’ve never had any communication or business with this company. Then, when you notice the email it was sent…
SMTP Strict Transport Security, or Make the World a Better Place
Two years ago, the world knew how to use and implement a new standard SMTP TLS Security. Many enthusiasts implemented and tested it. Recently, a new internet standard SMTP Strict Transport Security draft has been introduced to help organizations secure their emails. Let’s flip through how SMTP MTA STS…
Phishing Attacks – Security Awareness
Phishing is today’s most popular Internet scam. Phishing attacks are so successful as they are usually based on human emotions. Nowadays everyone has an email and fishing emails are sent in a bulk to thousands of targets. So how does it work? (more…)
In the “Ransomware” News Today…
“WannaCry, Wcry, and WannaCrypt enter the bank… Hands up! It’s a robbery – shouts one of them! Give us all your money (or just $300 bucks) for a password and no file will be hurt.” (more…)
Cyber Security: WiFi Security
Nowadays, many organisations want their employees to be mobile and be able to connect from everywhere. It is an excellent approach, however…. most of the network intrusions and phishing occur through mobile and wi-fi devices. Credentials can easily be phished by cyber-criminals and used to access your confidential data. Here…
One Of The Most Important Cyber Security Facts: Staff Security Awareness
One Of The Most Important Cyber Security Facts: Staff Security Awareness Information is the most valuable asset that organisations own. Information leakage caused by accident or due to a lack of awareness occur all the time and can cause huge damage to an organisation and even people lives! Although there…
Critical Vulnerability in Adobe Flash
A critical vulnerability has recently been identified by Adobe in their Flash Player version 23.0.0.185 or earlier. The CVE-2016-7855 vulnerability allows hackers to run malicious code on the affected computer using a Flash file. The existing exploit can potentially grant the hacker the full control over the affected system. Flash…
How to Enable Split Tunneling on Windows 10 VPN Connections
In Windows 10 if we click Properties on the Internet Protocol Version 4 (TCP/IPv4) settings, nothing happens. The button has no code behind it! (Looks like Microsoft forgot to enable this button ? ) So, to enable Split Tunneling in Windows 10 we must use PowerShell: Set-VpnConnection “VPN Connection Name”…
Stagefright: is your life companion vulnerable
During the last few days, only the lazy one did not mention the evil Stagefreight vulnerability, allowing vulnerability exploitation just by opening the evil MMS or playing video file prepared in a special way. At the time of discovery, about 95% of all devices were vulnerable. Now the gospel: there…