Search Results for: tracking number Blog Post Did You Get a FedEx Package Text? It’s a Scam! January 24, 2020 If you recently received a text notifying you that your FedEx package has been delivered, it could be a scam!... Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops... Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their... Blog Post LinkedIn Scam: Secret Shopper, Mystery Shopper and Detective Shopper Scams August 19, 2018 Mystery shopping is a great way to earn extra cash. And a message with an offer to work as a... Blog Post Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial... Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Facial Recognition Tracking COVID-19 May Expose Privacy March 24, 2020 In the ongoing coronavirus pandemic, face recognition technology has been adopted worldwide to track the spread of the virus. But... Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in... Blog Post Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set... Blog Post Special Olympics New York Becomes Hijacking Target January 3, 2020 On Christmas Eve, Special Olympics of New York’s email server had been hacked and used for phishing attacks on previous... Blog Post New Ransomware hitting Industrial Control Systems like a nuclear bomb February 10, 2020 Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post What is Social Engineering? April 28, 2020 Social engineering is an art to manipulate users and retrieve confidential information. The types of information the attacker seeks with... Blog Post FBI Fraud Alert: If you can answer “yes” to any of the following questions, you may be getting scammed May 22, 2019 FBI Fraud Alert: “If you can answer “yes” to any of the questions, you could be involved in a fraud...
Blog Post Did You Get a FedEx Package Text? It’s a Scam! January 24, 2020 If you recently received a text notifying you that your FedEx package has been delivered, it could be a scam!...
Blog Post How to Shop Safely This Holiday Season – Tips from LIFARS, FBI, FTC December 19, 2019 Holidays is on its way! By the end of the year, the great discounts offered by a lot of shops...
Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their...
Blog Post LinkedIn Scam: Secret Shopper, Mystery Shopper and Detective Shopper Scams August 19, 2018 Mystery shopping is a great way to earn extra cash. And a message with an offer to work as a...
Blog Post Importance of Information Systems Documentation for Security – What, How, and Why to Document? July 9, 2020 Today, the risk of security incidents and potential breaches is higher than ever before. Breaches affect large numbers of financial...
Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Facial Recognition Tracking COVID-19 May Expose Privacy March 24, 2020 In the ongoing coronavirus pandemic, face recognition technology has been adopted worldwide to track the spread of the virus. But...
Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in...
Blog Post Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set...
Blog Post Special Olympics New York Becomes Hijacking Target January 3, 2020 On Christmas Eve, Special Olympics of New York’s email server had been hacked and used for phishing attacks on previous...
Blog Post New Ransomware hitting Industrial Control Systems like a nuclear bomb February 10, 2020 Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post What is Social Engineering? April 28, 2020 Social engineering is an art to manipulate users and retrieve confidential information. The types of information the attacker seeks with...
Blog Post FBI Fraud Alert: If you can answer “yes” to any of the following questions, you may be getting scammed May 22, 2019 FBI Fraud Alert: “If you can answer “yes” to any of the questions, you could be involved in a fraud...