Estimated reading time: 3 minutes
The mobile is literally everywhere. It has permeated almost everyone’s lives which mean the distinctions between the personal and the professional have narrowed. A personal cell phone is used for a lot of professional work by employees. Think of...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 3 minutes
Business Email Compromise (BEC), also known as “Man-In-The-Email” or “CEO Fraud”, is a sophisticated type of phishing attack, carried out through elaborate means and usually with devastating effect. The US’s Federal Bureau of Investigation (FBI) estimated that global business...Estimated reading time: 1 minute
The recent zero-day vulnerability CVE-2018-8440 in Windows Task Scheduler enables attackers to perform a privilege elevation on targeted machines. Microsoft has released a security advisory CVE-2018-8440 on September 11, 2018 to address this issue. According to Microsoft, successful exploitation...Estimated reading time: 3 minutes
Traditionally, any discussion about network security is focused on a specific model that organizations have largely internalized. This model is boundary or parameter-based model and assumes of a perimeter or a boundary outside a network. By this model, cybersecurity...