Phishing attacks use links of up to 1,000 characters
Phishing attacks use links of up to 1,000 characters A new type of targeted phishing attack has caught the attention of the cybersecurity world in recent days. It’s a phishing
Scams exploiting “dots don’t matter” in Gmail continue
Scams exploiting “dots don’t matter” in Gmail continue Cybercriminals continue to apply phishing and BEC (Business Email Compromise) scams exploiting the fact that “dots don’t matter in Gmail addresses”, using
What are false positive and false negative in information security?
What are false positive and false negative in information security? In the world of information security, false positive is the term used to indicate a file or item that is
The trend of email impersonation attacks
The trend of email impersonation attacks Email impersonation attacks are one of the fastest growing types of attacks in the world, reaching out to different markets and companies of all
What is a DDoS attack?
What is a DDoS attack? A Distributed Denial-of-Service attack (DDoS) is an attempt to disrupt and block a server, network or service for a limited or unlimited time by overloading
After damages of USD 68 million, authorities seize a marketplace involved in the illegal sale of data
After damages of USD 68 million, authorities seize a marketplace involved in the illegal sale of data The FBI, Europol and other US and European agencies announced the seizure of
Scammers hijacked GoDaddy domains to apply bomb threat spam and other attacks
Scammers hijacked GoDaddy domains to apply bomb threat spam and other attacks The spam campaign that demanded payments of USD 20,000 in bitcoin under the threat of blowing up businesses,
The threatening and viral scam of free tickets
The threatening and viral scam of free tickets That free ticket message you see circulating on Facebook, Twitter, WhatsApp or any other social media or that you’re receiving in your
5 types of forged email attacks
5 types of forged email attacks Forged email, or spoofed email, is a tactic used by scammers to commit fraud. The purpose of an email forgery, as its name implies,
What are the parts of an email?
What are the parts of an email? What are the parts of an email? Many people and clients ask us this question and, in fact, that is a good one.