Top threats Archives - Calyptix Security Top threats Archives - Calyptix Security
Post filed under : Top threats
Post filed under : Top threats

4 Types of Social Engineering Used Every Day

4-Types-of-Social-Engineering-Used-Every-Day-1

Social engineering tactics are on the rise among hackers. More are calling victims and sending text messages – trying to con them into downloading remote desktop software or install malware.

See the top social engineering tactics used today in cyber crime. Raise awareness to arm yourself and your staff against phishing and con artists both in person and online.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

HTTPS Web Filters Can Harm Your Security – Here’s How!

HTTPS-Web-Filters-Can-Harm-Your-Security-1

Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.

Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : 1 Comment
Tagged on : top threats

Top 10 Security Vulnerabilities of 2017

top-10-vulnerabilities-of-2017---1

New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.

See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

VPNFilter: 500,000 Infected and Worse Than Reported

VPNFilter-router-attack-1

A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.

Called VPNFilter, the malware allows attackers to monitor traffic, steal login credentials, brick the device, and even inject malicious JavaScript into users’ web sessions.

See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats

Top Causes of Data Breaches by Industry 2018: Verizon DBIR

verizon-data-breach

Most IT firms have clients from a range of industries. That means you encounter a wide range of security threats. How do you know which threats are the most important to focus on?

Check out the leading causes of data breaches across eight sectors. You’ll see attack trends in retail, healthcare, finance, government, and more – and even a few surprises.

Continue reading

Filed under : Top threats
Author : Calyptix
Comment Number : No Comment Yet
Tagged on : top threats
Page 1 From 7