Zephyrnet Logo

Tag: phishing

Businesses need quick ways to respond to fraud during COVID-19 (Bence Jendruszak)

During COVID-19 we’ve seen the mass digitisation of many industries. With countries around the world going into lockdown, while highstreets and physical stores...

Student Data Privacy: Is It Safe to Buy Essays Online?

The internet makes our lives easier in many ways. We can order virtually anything online, in just a few clicks, and get it...

How to tell if your camera has been hacked and how to prevent it?

The kind of cybercrime that involves hacking your webcam is known as camfecting. Violators might do it to blackmail you or sell your...

How to protect remote workers from phishing and other attacks

Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past...

Attackers Scanning for PoS Software in New Sodinokibi Ransomware Campaign

Making extra money from victims appears to be the goal, Symantec says.Operators of Sodinokibi — one of the biggest ransomware threats currently targeting...

Cybercrime Infrastructure Never Really Dies

Despite the takedown of the "CyberBunker" threat operators in 2019, command-and-control traffic continues to report back to the defunct network address space.Nine months...

Could selfies be the key to fighting COVID-19 fraud? (René Hendrikse)

From social media scams to fake government texts, phishing links in business emails and false phone calls, fraud has risen sharply since the...

How do I select a mobile security solution for my business?

The percentage of companies admitting to suffering a mobile-related compromise has grown, despite a higher percentage of organizations deciding not to sacrifice the...

5 cybersecurity considerations for getting back to work securely

As governments begin lifting emergency orders, company leaders are considering policies, technology and processes that will protect their workforces. Many of these factors...

Cyber Security Budget Shift Happens: What Action Can A CISO Take?

In Why Is Top Cyber Security Taking Flight, Cyber Security Hub first noted a striking outcome from our Mid-Year Survey that will further...

Stalker Online hacked! Over one million gamers’ passwords made available for download

More than one million players of the video game Stalker Online have been put at risk after hackers offered them for sale on...

How Ransomware Works?

Ransomware is gaining more momentum! Over the past many years, ransomware is in the spotlight of the cyber-attack landscape. Nevertheless, many still wonder...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?