AiTM phishing attacks: What to do when MFA is not enough

Companies are now increasingly reliant on technology and the internet to conduct their business. With phishing attacks growing in sophistication, businesses must now utilize advanced technology and tools to defend themselves against attacks.  

AI and the war on Cyber Crime

As we have written about in other blog posts, convolutional neural networks (CNN) have revolutionized computer artificial intelligence (AI).  AI has allowed computers to both process and create data in completely new ways. This presents challenges...

Planning your next trip? Protect yourself, virtually

With restrictions against traveling lifting, you may be looking to jet-set to your next international destination. Or maybe you are planning a trip to your favorite vacation spot in Florida. Whether traveling for leisure or trying to make it to that...

Ransomware in the news

The recent attack on Colonial Pipeline's systems brought ransomware to the forefront of the news, and many Americans learned about it for the first time as they experienced the impact via higher gas prices and shortages due to panic buying....

The Business to Scammer (B2Scam) Tactic

You have all gotten spam before. Emails from dying millionaires who want to give you their money, or an official from a deposed government trying to sneak money out of the country, etc. You've all done the right thing and deleted the emails. I hope.

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all