[gtranslate]
Man using mask to 'invest' or better saying, apply email scam

Is it an investment opportunity or an email scam?

Is it an investment opportunity or an email scam? Gatefy’s email security solution has detected a new variation of a phishing scam that uses email spoofing. This time the cybercriminal

Publicação
Cybercriminal attacks computer and cause billions of prejudice

Cyber attacks cause USD 45 billion damage in 2018

Cyber attacks cause USD 45 billion damage in 2018 The 2018 Cyber Incident & Breach Trends Report, released by the Online Trust Alliance (OTA), brings alarming data regarding cyber attacks.

Publicação
Stork carrying newborn on people studying the history of social engineering

Social engineering history in the age of computers and the internet

Social engineering history in the age of computers and the internet In the context of information security, social engineering is a trending topic. It’s a technique used by hackers to

Publicação
Cracked shield and open padlock as the employee error that make your business vulnerable

The human factor, how employees make your business vulnerable

The human factor, how employees make your business vulnerable Cybersecurity is an increasingly recurring subject within companies. In this context, much has been discussed about the responsibility and role of

Publicação
Gears in the head and robot typing behind a logistic regression

What is logistic regression and how do we use it in emails

What is logistic regression and how do we use it in emails Logistic regression is an algorithm that deals with classification issues and problems. It’s one of the best known

Publicação
Fish hook phishing email from a man's computer with social engineering attack

4 tips to protect your business from social engineering attacks

4 tips to protect your business from social engineering attacks Social engineering is a very common concept when it comes to cybersecurity. It’s a technique used to commit scams, especially

Publicação
Worm and virus hidden in a message and being found by magnifying glass

What is the difference between a worm and a virus?

What is the difference between a worm and a virus? Viruses and worms are some of the most classic cyber threats out there. They’re malicious programs that infect computers and

Publicação
Hacker attacking and buble acts to protect your domain

3 tips to protect your domain and prevent email spoofing

3 tips to protect your domain and prevent email spoofing Spoofing is a tactic used in cyber attacks in which crooks try to impersonate a domain in order to lure

Publicação
Systems featuring control over company email

3 reasons to have control and visibility over your company email

3 reasons to have control and visibility over your company email For sure, email is one of the main means of communication for a company. Nothing new there, right? But,

Publicação
Phishing attacks HTTPS of a woman's computer

Phishing attacks exploit HTTPS, warns FBI

Phishing attacks exploit HTTPS, warns FBI Do you know the HTTPS and that lock symbol that appear when you are surfing the internet and that many people say have to

Publicação