Month: February 2018

If different types of cyber-attacks were a group of friends, credential stuffing would be the odd one out. This isn’t a data breach in the technical sense, as the system under attack isn’t directly compromised. Kind of like the difference between kicking a door in and finding the spare key under a potted plant. Credential…

Phishing isn’t what it used to be. Malicious websites look legitimate and crooked emails appear to come from trusted senders. It’s now harder than ever to know how to prevent these kinds of attacks. That’s why we’ve compiled six simple steps to help you protect yourself and your business. But before we get started on…

Perhaps you have heard of the huge password breaches that online giants like Yahoo have suffered in the past years. Perhaps you’ve also thought that those breaches wouldn’t disturb your business. Another website getting hacked shouldn’t affect another one, right? Not exactly. Where there is easy profit to be made, hackers are usually lining up….

Even if your website is secure, your user’s credentials could still be available to buy online. It’s time to learn more about credential stuffing attacks and how lousy password choices make them easier to administer. Choosing a password isn’t simple, especially when we’re asked to make them complex. That’s why we often pick passwords that…

Imagine if someone went on a shopping spree with your credit card, but when you called the bank, they didn’t believe that you were you? Users targeted by account takeover attacks face scenarios like this every day. Read on and learn how to prevent these devastating hacks. Hackers breach user accounts to commit fraud Account…

Whether your business is big or small, it can get targeted by hackers. It’s easy to feel uncertain about how to protect your sensitive information. It’s also easy to get overwhelmed with confusing advice. What you might not know is that a lot can be accomplished quickly and easily. We have listed four simple ways…