Calyptix, Author at Calyptix Security - Page 2 of 15 Calyptix, Author at Calyptix Security - Page 2 of 15
Post written by : Calyptix
Post written by : Calyptix

4 Types of Social Engineering Used Every Day

4-Types-of-Social-Engineering-Used-Every-Day-1

Social engineering tactics are on the rise among hackers. More are calling victims and sending text messages – trying to con them into downloading remote desktop software or install malware.

See the top social engineering tactics used today in cyber crime. Raise awareness to arm yourself and your staff against phishing and con artists both in person and online.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

HTTPS Web Filters Can Harm Your Security – Here’s How!

HTTPS-Web-Filters-Can-Harm-Your-Security-1

Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.

Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : 1 Comment
Tagged on : top threats

Cyber Mistakes in Healthcare: Vulnerabilities and Misconfigs.

Cyber-Mistakes-in-Healthcare-1-1

Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.

Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.

Continue reading

Filed under : hipaa
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : HIPAA

Top 10 Security Vulnerabilities of 2017

top-10-vulnerabilities-of-2017---1

New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.

See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

VPNFilter: 500,000 Infected and Worse Than Reported

VPNFilter-router-attack-1

A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.

Called VPNFilter, the malware allows attackers to monitor traffic, steal login credentials, brick the device, and even inject malicious JavaScript into users’ web sessions.

See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats
Page 2 From 15