The fifth generation of wireless communications—5G—has been hotly anticipated, already appearing in advertisements for cellular connectivity and set to expand the potential of automated processes. One particularly pertinent application is to the smart devices and services that make up the Internet of Things. Let’s consider where 5G currently stands, and how its capabilities could impact the IoT. Read More
- Published: 07 Dec 2020
Cyberattacks continue to be a major problem as scammers send out billions of phishing messages a day. While it doesn’t really sound that nefarious it can be a major problem for a lot of people. One version of phishing, the absurdly labeled smishing, is gaining traction and presents another avenue of attack for hackers.
- Published: 18 Nov 2020
Business success is often tied to the quality of your business relationships, and there are many people you need to trust: suppliers who can provide you with everything you need, the team who do their jobs, and customers who turn to you because they know they need you. Unfortunately, it is possible for cybercriminals to
- Published: 21 Oct 2020
Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.
- Published: 04 Sep 2020
With COVID-19 creating the challenges that it has for so many, there is little wonder that creating a vaccine is such a major focus. Unfortunately, hackers are aware of this focus, and how it makes the organizations conducting vaccine trials particularly vulnerable. Let’s examine this situation, and the lessons that all businesses can take away
- Published: 07 Aug 2020
One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack.
- Published: 15 Jun 2020
We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.
- Published: 16 Mar 2020
Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do
- Published: 17 Jan 2020
Cybercrime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting trickier.
- Published: 09 Oct 2019
Fishing – a jerk on one end of a line waiting for a jerk on the other end.Phishing – very similar to fishing, but much more consequential. While the word phishing is humorous and relatable due to it being derived from the word “fishing”, the consequences of falling victim to a phishing attack are far
- Published: 10 May 2019
Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any scam, the best defence against those that appear on social media is good, old-fashioned awareness