A new phishing technique is making a big splash in the tech world, because it makes phishing pages appear as if they are trusted, legitimate sites. A few weeks ago, someone posted a brief explanation of what’s being called a Browser in the Browser Attack (BitB),...
On this blog we often talk about ways to keep your network secure to protect your proprietary and sensitive information. It’s easy to lose sight of the fact that major corporations face the same challenges, just at a much larger scale. For a lot of major...
Internet-connected appliances can be pretty cool… If you have an Alexa-integrated coffee machine or WiFi-connected vacuum cleaner that is internet capable, you surely know what kind of convenience it brings. On the other hand, convenience always brings added security...
We’ve written on this blog about keeping your network safe by using strong authentication, advanced firewall technology, and modern antivirus software. Today, we’ll discuss another strategy for securing your networks: the honeypot. This technique allows...
A lot of us use a mobile device (a phone or tablet) so frequently that we consider it to be our primary computer. In a lot of ways, mobile device security is the same as workstation security, except for the fact that the device stays with us wherever we go. The...
Personal information has never been under so much threat from bad actors. Increasingly, our information is being used to gain access to our company’s information to increase the scale of an attack. In fact, one of the most valuable ways that criminals can use our...