With evil elements continuously developing novel ways to infiltrate networks and steal user data, it is more crucial than ever to stay one step ahead of the curve. Protect yourself from cybercriminals by learning more about their methods. Here are some tips to deal with the threat of watering hole attacks: What are watering hole […]
Anglers catch fish by dangling bait in front of their victims, and hackers use the same strategy to trick your employees. There’s a new phishing scam making the rounds and the digital bait is almost impossible to distinguish from the real thing. Here are the three things to watch out for in Office 365 scams. […]
Bad news, internet users: Cybercriminals have developed more advanced tricks to compromise your systems. While you may be familiar with attacks involving suspicious emails, the new kid on the block known as watering hole attacks are far more nefarious and effective. Fortunately, there are a few things you can do to keep yourself safe. What […]
Every week it seems like there is another major data breach… so what’s the deal? Are attackers getting more sophisticated; Is malware more sneaky; Or are people just not protecting themselves? That answer is probably simpler than you think.
Digital network attacks that can blow up generators, shut down power grids, or damage nuclear facilities seem like the stuff of science fiction. However, we currently live in a world where nation-states launch just such attacks against one another, and may escalate them in the future. In this episode, Nachreiner interviews an industry expert from Alstom Grid about SCADA and ICS systems, and attacks against them.