Author: amarbasic

You may have heard of a cybersecurity framework – or several, actually – being adopted by large organizations (businesses, NGOs and other entities) or by state actors. But what is a cybersecurity framework, why are there several such frameworks and how do they work?   We’ll answer all these questions and more in the following guide. We noticed that the info on cybersecurity frameworks available online is...

Read More

In a previous guide, we’ve covered the elusive topic of iPhone malware: if it exists or not and how to handle it if you’re among the few users to get infected with one of its versions. When it comes to Android malware, things are much simpler: everyone knows that numerous forms of Android malware exist, so there’s no need to establish its existence first. But since...

Read More

iPhone malware tends to be rarer overall compared to the malware strains which are targeting Android-based smartphones. That’s because iPhones are more expensive and thus benefit from better protection, updates and support from Apple, the company which issues them. But although not so common, iPhone malware is not unheard of. Furthermore, the strains of malware which do manage to infect iPhones are all the more dangerous,...

Read More

Smart objects and smart homes are shifting from a fun project to be presented at tech shows to a more common reality, worldwide. At the same time, as we all know, malicious threats are becoming more advanced and harder to keep at bay through legacy security solutions like anti-virus software.   But while other pieces of technology are striving to keep up with the threatscape and strengthen...

Read More

We’ve discussed social engineering elsewhere on the blog and we’ve established that it refers to any type of attack relying on the human factor in order to achieve its goals. But a particular type of social engineering requires a bit more attention that the rest, especially since it’s becoming more and more frequent. CEO fraud, or a scam where the hackers pretend to be the...

Read More

Phishing email refers to the malicious practice of sending a fraudulent email under a false pretext in order to steal someone’s credentials.   What does this mean in laymen terms? How does a phishing email work? Do phishing campaigns target only regular people or companies as well? How can you stay safe from phishing scam? Learn all this and more in our 101 guide on phishing.   Origin of...

Read More

  Pentesting is the science, know-how and art of finding security vulnerabilities (penetration vulnerabilities) in software and IT networks. When not done by professional pentesting companies, it’s better known as hacking. The last term may seem a bit harsh, but it’s the best way to describe the processes of identifying weak spots in an information system.   Of course, when not done maliciously, the activity is labeled as...

Read More