Cyber Attack Number 6/15: SQL injection
/SQL Injection
Sounds sophisticated, but this is often such a simple attack, anyone could do it. SQL is a common language that databases are written in. And this makes a lot of people vulnerable.
Read MoreSQL Injection
Sounds sophisticated, but this is often such a simple attack, anyone could do it. SQL is a common language that databases are written in. And this makes a lot of people vulnerable.
Read MoreSocial Engineering is when hackers exploit human psychology, usually by tricking them into volunteering information which can then be used to gain access to user accounts, identity theft, fraud etc.
There are many different types of Social Engineering. In this post we discuss them and a video that shows just how easy it can be for a experienced hacker to get your info.
Read MoreShort for Robot Network, a Botnet is when a group of computers anywhere in the world are all infected by malware to create a network of interconnected computers that can be used by hackers for numerous types of Cybercrimes.
Learn how to best mitigate your risk of a Botnet Attack.
Read MoreDo you have a WordPress site? Are you sure you’re keeping the plugins updated?
Drive By Attacks
Hackers might exploit a vulnerability and inject a malicious code and more. Visitors to the site might get infected by malware, leading to loss of trust and reputation, and loss of customers.
Read MoreIt’s a normal day, you receive an email that someone has shared a OneDrive document with you. When you click on the link it asks you to log in to your Office 365 account. You enter your credentials and nothing happens…
You’ve Been Phished
Once you enter your credentials the hackers now have access to your email account. Then they just watch and wait.
Read More