Post date: 06/09/2021 - 09:56
Phishing is the general term for the fraudulent practice of sending online communications, often pretending to be reputable companies, to elicit personal details such as passwords or bank information from a target.

Phishing can come in a multitude of forms ranging from email, SMS, websites, and voice messaging.

Why would someone phish?

Post date: 06/09/2021 - 09:43
Formed from the words ‘robot’ and ‘network’ a botnet is a term used to describe a collection of hijacked devices with the intent of carrying out mass attacks such as phishing, DDoS, and malware distribution.

A hacker will form a botnet to increase the volume of their future attacks without the original device owner’s knowledge or consent.
Post date: 01/09/2021 - 13:48
Malware is an umbrella term for any form of malicious software that aims to cause harm to a device, network, or service.

Post date: 20/08/2021 - 11:39
There has been a steady increase in the number of attackers opting for a low and slow method to disarm their target. Unlike traditional DDoS attacks that utilise sheer power and brute force to overwhelm a network, low and slow opts for a more subtle approach - meaning that typical DDoS software may leave the attack undetected as it doesn’t appear any different to usual website and network traffic.

Post date: 20/08/2021 - 11:20
A distributed denial of service (DDoS) attack is a hostile attempt to interfere with the usual traffic of a server by overwhelming the target with a flood of traffic, exploiting compromised computers and other internet-connected devices as sources of attack traffic.

But what does that mean?

Post date: 10/08/2021 - 15:06
The power, frequency, and sophistication of DDoS attacks is on the increase, and the landscape of cyber security is in a constant state of evolution in an attempt to mitigate not only the known dangers; but also the dangers yet to come.

Post date: 10/08/2021 - 14:45
Although all DDoS attacks have the same goal in mind, the overwhelm the server to the point of shutdown, the methods in which they strive to achieve this can vary depending on the attack type. These variations are designed to circumvent security measures, and depending on how intelligent your protection they may be able to go completely undetected.

Post date: 10/08/2021 - 09:18
"I think it's more than likely we're going to end up, if we end up in a war - a real shooting war with a major power - it's going to be as a consequence of a cyber breach of great consequence, and it's increasing exponentially," President Biden said.

President Biden leads the charge against cyber crime with the “National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems”. Issued on July 28th 2021, the memo aims to build on Biden's previous executive order on improving the nations cybersecurity in May 2021, which primarily addressed government and government contractors’ security practices.

Post date: 23/06/2021 - 15:02

A Brief Summary

Post date: 08/06/2021 - 15:12

As many offices have temporarily closed their doors due to the global health crisis, organisations around the country have been forced to work full-time from the comfort of their own homes. Despite experiencing collective anxiety and uneasiness during these distressing times, many employers have discovered that allowing employees to work remotely can make them happier and more productive.

Pages