Blog

Mischievous Malware – Part 2 – Malvertising

We are continuing our discussion from yesterday about mischievous malware. Now that you are a bit familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam. Malvertising. This has been gaining headway on Google, so much so, they created an individual landing page asking consumers…
Read more

Social Engineering – Part 2 – Internal Threats

Yesterday, we started looking at Social Engineering. Today, we will look at some internal threats and more... Internal Threats Originally, social engineering took place in a physical setting. A hacker would do some preliminary research on a company structure or focus on behaviors in order to get that initial access into a building, server room…
Read more