Cyber Security Blog

  Pentesting is the science, know-how and art of finding security vulnerabilities (penetration vulnerabilities) in software and IT networks. When not done by professional pentesting companies, it’s better known as hacking. The last term may seem a bit harsh, but it’s the best way to describe the processes of identifying weak spots in an information system.   Of course, when not done maliciously, the activity is labeled as...

Read More

Phishing email refers to the malicious practice of sending a fraudulent email under a false pretext in order to steal someone’s credentials.   What does this mean in laymen terms? How does a phishing email work? Do phishing campaigns target only regular people or companies as well? How can you stay safe from phishing scam? Learn all this and more in our 101 guide on phishing.   Origin of...

Read More

We’ve discussed social engineering elsewhere on the blog and we’ve established that it refers to any type of attack relying on the human factor in order to achieve its goals. But a particular type of social engineering requires a bit more attention that the rest, especially since it’s becoming more and more frequent. CEO fraud, or a scam where the hackers pretend to be the...

Read More

Smart objects and smart homes are shifting from a fun project to be presented at tech shows to a more common reality, worldwide. At the same time, as we all know, malicious threats are becoming more advanced and harder to keep at bay through legacy security solutions like anti-virus software.   But while other pieces of technology are striving to keep up with the threatscape and strengthen...

Read More