“If the door is locked, try the window” — that’s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace “the door” with “the system security” and “the window” — with employees. Today we will talk about techniques that hackers use to...
Blog
Mobile security in a business environment
Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether...
The “Pizza” method – a social engineering Case Study
‘Eight pizza delivery boxes with 30% discount and a free gadget for the computer’. Hackers posing as pizza delivery carried on a successful social engineering attack on the Warsaw branch office of a well-known international corporation. In a few minutes, they hacked...
WordPress. The most hacked CMS in the world and how not to become a part of the statistic.
Without a doubt, WordPress is our favorite Content Management System (CMS) in recent years. According to most recent statistics of W3Techs, WordPress accounts for roughly 60% of entire CMS market share in the first quarter of 2019. Other CMS platforms, such as Joomla...
Staying anonymous in web – a way to safe browsing – popular solutions and good practices
The article below is purely educational. The author presents solutions, that can assure safe browsing if used for legal purposes only. Utilising the tools listed below in illegal ways might cause criminal liability. While using the internet, we tend to think...
How will cybersecurity landscape change in 2019?
Cybersecurity is something we tend to look at in the light of massive amounts of news we see daily. Innovative hacking techniques, big security breaches, millions of compromised accounts, ransomware attacks. These are the information we’re fed with and it shouldn’t be...