Tag - malware

Data Breach: covert redirect

Data breach: covert redirect

Covert Redirect is a security breach and occurs when cyber hackers use open routing. Open redirects are not successful in checking whether the redirected URL is a valid URL. Cybercriminals who use covert redirect take advantage of this weakness, open a fake login window, steal login information, and redirect [...]

Read more...

Email services and their security issues

Without a doubt, emails have become one of the most important tools on the internet today, where they are being used in the formal/informal daily communications. The practicality of email also raised concerns about email security, because we see it in every part of our life. Email, which stands for ‘Electronic [...]

Read more...
Phishing training

Cyber Safety Rules

Want to try Keepnets’ Phishing software for phishing training?  Cybercriminals are not only targeting big enterprises and they also attacking SMBs and specific individual using many attack vectors like Phishing, vishing, BEC, ransomware, crypto-jacking, SMS phishing.  Therefore, understanding and following effective rules of cyber safety will help you to protect [...]

Read more...
Anti phishing solution

Privacy In Wireless Networks

Try our modern anti phishing solution for free.  Privacy in Wireless Networks For many internet users, it is helpful to use libraries and public computers. The devices in these public places provide a great source of quality. However, when using these devices it is important to have the proper online security [...]

Read more...
Prevent Ransomware Attacks

Prevent Ransomware Attacks

Prevent Ransomware Attacks – As technology develops, the frequency of ransomware increase against internet users and institutions. It is important that digital citizens be alerted to digital hygiene, which is a fundamental part of the global world, and get protected against ransomware and phishing attacks increase. Use our phishing software to avoid [...]

Read more...
Mobile device security

Securing Mobile Devices

Today, mobile devices (smartphones, laptop computers, and tablets) are always available to you everywhere you go and are used for business, travel entertainment, or for different purposes. These devices allow you to easily connect to the world around you. However, mobile phishing has been a trending method for cybercriminals [...]

Read more...
Petya Ransomware Attack

Petya Ransomware Attack

With the #Wannacry attacks last month,  in many countries important sectors such as health, finance and energy suffered great losses. [1] As it has been predicted in our previous writing titled as “New Risks in Corporate Firms towards WannaCry Attacks” that “if the self-renewed subsequent version attacks are not [...]

Read more...
Ransomware office 1

The Ransomware Risks in Office Files

Free phishing test: Keep your employees aware of the Ransomware threats Ransomware has become a nightmare for individuals and institutions for the last 2 years, previously found in September of 2013.  It is a dangerous kind of trojan horse in the ransom category. Initially bound to Microsoft Windows operating systems, [...]

Read more...