To VPN or not to VPN

Have you ever questioned if virtual private networks (VPNs) provide adequate privacy and security? Do you trust your VPN? There has always been something suspicious about VPN, because instead of trusting your own ISP, you choose to trust some guys somewhere in the world and an unknown ISP. VPNs are supposed to hide your data …

Tips for Recognizing a Social Engineering Attack

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will …

The New Normal in Cybercrime

The volume and sophistication of attacks targeting organizations is accelerating at an unprecedented rate. Fortinet’s Q4 2017 Threat Landscape Report, just released this week, reports an average of 274 attacks per firm, which is a staggering 82% increase over the previous quarter. One reason for this spike is that in order to hit the maximum number of targets, …

Malware – The Basic Concepts

When we see breathless posts warning about malware spread across social media, they invariably demonstrate that the author – and indeed those who share the warning – don’t really understand the basic concepts of malware. Often, this is because they use nonsensical terminology such as “Trojan worm virus” – something, that after reading this article, …