Cyber for all - Page 3

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Common sense and 10 other recommendations to protect your mobile
Common sense and 10 other recommendations to protect your mobile

Update your phone, make backups, set up two-factor authentication, check app permissions, and follow these recommendations to protect your mobile A few weeks ago, we discussed the [...]

Read more
The QR code scam and quishing: Be careful what you scan!
The QR code scam and quishing: Be careful what you scan!

The QR code scam is used to attack cell phones, spy on companies, commit fraud and obtain access credentials to applications and platforms A British citizen scanned a QR code to pa[...]

Read more
Cloud security strategy for enterprises
Cloud security strategy for enterprises

The massive use of Software as a Service forces companies to have a cloud security strategy for enterprises that allows them to prevent security incidents Enterprise environments h[...]

Read more
Could we run out of electricity or water? This is what cyber-attacks against critical infrastructures look like
Could we run out of electricity or water? This is what cyber-attacks against critical infrastructures look like

Cyber-attacks against critical infrastructures have become one of today’s significant threats because of their severe economic and social consequences At Christmas 2015, thou[...]

Read more
Whaling attack, when criminals think they are Captain Ahab
Whaling attack, when criminals think they are Captain Ahab

The whaling attack is a phishing attack that targets corporate executives to obtain critical information or commit large-scale fraud Many cybersecurity concepts have their origins [...]

Read more
How can a simple open port scanner help you protect your cybersecurity?
How can a simple open port scanner help you protect your cybersecurity?

The open port scanner is a tool that allows companies to inventory their assets and evaluate their perimeter security measures In cybersecurity, often, the same technique or tool c[...]

Read more
How can the security of cell phones used by workers in the workplace be tested?
How can the security of cell phones used by workers in the workplace be tested?

Companies can undergo specific security audits to test the security of cell phones used by employees in the workplace. Threats to cell phones are becoming increasingly common and c[...]

Read more
How is the security of a mobile application evaluated?
How is the security of a mobile application evaluated?

Assessing the security of a mobile application is essential to detect problems in apps and mitigate them before cybercriminals exploit them In early May 2024, it became public that[...]

Read more
Infostealer: How criminals steal device credentials
Infostealer: How criminals steal device credentials

Infostealer is malware that can steal passwords, cookies and other credentials from a device’s browsers, apps and documents «Meow, meow, meow». In this way, an X account an[...]

Read more
1 2 3 4 5 6 14