Cyber Attack Number 8/15: Cross-Site Scripting (XSS)

Cyber Attack Number 8/15: Cross-Site Scripting (XSS)

Your website was custom built using a template that is no longer supported. Because the custom template is no longer supported, you no longer have the ability to update all the plugins on the website, leaving it vulnerable to attacks.

Learn how to protect yourself from XSS Attacks.

Read More

Cyber Attack Number 5/15: Social Engineering

Social Engineering is when hackers exploit human psychology, usually by tricking them into volunteering information which can then be used to gain access to user accounts, identity theft, fraud etc.

There are many different types of Social Engineering. In this post we discuss them and a video that shows just how easy it can be for a experienced hacker to get your info.

Read More

Cyber Attack Number 4/15: Botnet Attacks

Cyber Attack Number 4/15: Botnet Attacks

Short for Robot Network, a Botnet is when a group of computers anywhere in the world are all infected by malware to create a network of interconnected computers that can be used by hackers for numerous types of Cybercrimes.

Learn how to best mitigate your risk of a Botnet Attack.

Read More