Search Results for: steal your identity Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts.... Page LIFARS in the News – Press Room January 7, 2020 Date Logo News-Topic Link 12/06/2019 PRNewswire: The Cybervaccine acts as a do-good virus, fights fire with fire. Cyber Vaccine,... Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops... Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast... Blog Post Interview with ABC7NY on “How ID Thieves Could Steal Your Identity From A Selfie” April 3, 2017 Ondrej Krehel, CEO of LIFARS and Cyber Intelligence coordinator, Lisa Minervini speaks about the risk of getting your identity stolen by... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make... Blog Post Biometrics and Cybersecurity May 21, 2020 Biometrics is a center piece of security. Technology makes a lot of things easy, but at the same time security... Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,... Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,... Blog Post Its Time you Installed An Authentication App January 20, 2020 Adding multi-factor authentication (MFA) or two-factor authentication (2FA) is a popular measure to protect your high-value online accounts. 2FA... Blog Post DHS: Cybersecurity Tips While Traveling April 20, 2020 Before You Go Update the antivirus and anti-malware software installed in your devices to the latest version. Patch all your... Blog Post Details of Critical VMware Vulnerabilities April 22, 2020 VMware patched a security vulnerability related to vCenter Server last week. This security vulnerability numbered CVE-2020-3952 is located in VMware... Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts....
Page LIFARS in the News – Press Room January 7, 2020 Date Logo News-Topic Link 12/06/2019 PRNewswire: The Cybervaccine acts as a do-good virus, fights fire with fire. Cyber Vaccine,...
Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops...
Blog Post CISA Director: Attackers Targeted Port of Houston October 19, 2021 According to a joint security alert issued by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Coast...
Blog Post Interview with ABC7NY on “How ID Thieves Could Steal Your Identity From A Selfie” April 3, 2017 Ondrej Krehel, CEO of LIFARS and Cyber Intelligence coordinator, Lisa Minervini speaks about the risk of getting your identity stolen by...
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post New Year’s Cyber Security Resolutions for a Safer and more Secure 2021 January 29, 2021 A new year is upon us, and it’s a time to look forward to building on past successes and make...
Blog Post Biometrics and Cybersecurity May 21, 2020 Biometrics is a center piece of security. Technology makes a lot of things easy, but at the same time security...
Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,...
Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,...
Blog Post Its Time you Installed An Authentication App January 20, 2020 Adding multi-factor authentication (MFA) or two-factor authentication (2FA) is a popular measure to protect your high-value online accounts. 2FA...
Blog Post DHS: Cybersecurity Tips While Traveling April 20, 2020 Before You Go Update the antivirus and anti-malware software installed in your devices to the latest version. Patch all your...
Blog Post Details of Critical VMware Vulnerabilities April 22, 2020 VMware patched a security vulnerability related to vCenter Server last week. This security vulnerability numbered CVE-2020-3952 is located in VMware...
Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...