Brute force attacks increase due to more open RDP ports

More open ports are inviting attackers to try and gain entry by using brute force attacks. Why is this happening and what can we do?

Read more

The passwordless present: Will biometrics replace passwords forever?

The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?

Read more

Threat spotlight: Phobos ransomware lives up to its name

Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.

Read more

Are hackers gonna hack anymore? Not if we keep reusing passwords

A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.

Read more

Simple Authentication and Security Layer (SASL) vulnerabilities

The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?

Read more

Is two-factor authentication (2FA) as secure as it seems?

Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?

Read more

Select your language