Drive by Downloads
The following article is the fifth of a series of articles on Cyber Attacks and focuses on drive by downloads. Used in many of the most common cyber-attacks, drive by downloads are hard to spot and involve little or none interaction by the victim. A drive by download can either be a download authorised by the […]
Social engineering techniques, Social Media scams
The following article is the fourth of a series of articles on cyber attacks and the last of a series of three articles on social engineering techniques, and focuses on social media scams. With Facebook averaging 1.71 billion monthly users and rising, Twitter with 313 million monthly users not to mention the other popular platforms, social media is […]
Social Engineering techniques, Support Scams
The following article is the third of a series of articles on cyber attacks and the second of a series of three articles on social engineering techniques, and focuses on support scams. How many times have we heard of hacks resulting from social engineering techniques? Social engineering practices are used mostly because it’s easier to exploit someone […]
The various types of cyber attacks. Social Engineering and various phishing techniques
The following article is the second of a series of articles on cyber attacks and the first of a series of three articles on social engineering techniques, and focuses on phishing scams. How many times have we heard of hacks resulting from social engineering techniques? Sadly, way too many times social engineering has […]
The various types of cyber attacks
With ever increasing reliance on the internet, especially in business-related environments, internet fraud has risen exponentially over the past few years. Nowadays most of our information is online, accessible and visible to everyone, almost every business has a webpage introducing their employees and their roles, and these employees themselves use at least one social […]