It only takes one device to hack a network

It only takes one device to hack a network

A corporate laptop being used in a coffee shop at a weekend was enough to allow a sophisticated cybercrime group to compromise an organisation’s entire infrastructure.   The incident was detailed by cybersecurity firm Crowdstrike as part of its Cyber Intrusion Services Casebook 2018 report and serves as a reminder that laptops and other devices that are secure while…

Test your phishing email detection skills with Google

Test your phishing email detection skills with Google

Test your phishing email detection skills with Google. Source: Phishing Quiz Phishing is a hacking technique where the attacker fakes their identity to the victim, hoping the victim will not notice that they are not talking to who they think they are.  At my school we’ve had several emails from attackers saying they are a principal,…

Securing yourself online – phishing attacks

Securing yourself online – phishing attacks

Phishing attacks are increasing in number and evolving in variety (newer methods include spear phishing and CEO fraud), putting at risk millions of users worldwide – actually, everyone with an email account. Why are they so popular among fraudsters and why are they so successful? Source: 6 reasons why phishing is so popular and successful –…