Mischievous Malware – Part 2 – Malvertising
We are continuing our discussion from yesterday about mischievous malware. Now that you are a bit familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam. Malvertising. This has been gaining headway on Google, so much so, they created an individual landing page asking consumers […]
Mischievous Malware – Part 1
Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of mischievous malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal […]
Social Engineering – Part 2 – Internal Threats
Yesterday, we started looking at Social Engineering. Today, we will look at some internal threats and more… Internal Threats Originally, social engineering took place in a physical setting. A hacker would do some preliminary research on a company structure or focus on behaviors in order to get that initial access into a building, server room […]