Blog

 

Guide

Gearing up for safe remote work

Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured...

Guide

VPN for private use – a good idea?

Anyone using YouTube lately has probably seen the all-prevalent ads: if you purchase a private VPN service, you’ll be safe online: your traffic will be fully encrypted, your ISP will not track you, on top of that, you’ll get access to content otherwise blocked in your country. For a few...

security

Social engineering techniques used by hackers

“If the door is locked, try the window” — that’s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace “the door” with “the system security” and “the window” — with employees. Today we will talk about techniques that hackers use to perform social engineering attacks. What are...

Guide

Mobile security in a business environment

Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether the IT department is...

Case Study

The “Pizza” method – a social engineering Case Study

‘Eight pizza delivery boxes with 30% discount and a free gadget for the computer’. Hackers posing as pizza delivery carried on a successful social engineering attack on the Warsaw branch office of a well-known international corporation. In a few minutes, they hacked the IT system – effectively paralyzing the operations...

Uncategorized

Secure Guild – online conference with CyberForces

Security testing has become an essential part of any sort of testing, be it mobile applications or websites. As such it’s becoming one of the crucial skills any QA specialist should have! What if You could learn from top experts during the online conference focused only on security testing? Secure...

1 2 3