Hit enter to search or ESC to close
GalaxkeyGalaxkey
  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
Category

Clickjacking

Clickjacking

Understanding the impact of clickjacking

Cybercriminals have a raft of tactics and tricks they employ against organisations and individuals, from…
Brad
Brad13th November 2020

Recent Posts

  • German telecoms giant discloses data leak
  • Ransomware gang hits Finnish IT services firm
  • Top tactics used in phishing attacks today
  • What are “Common Vulnerabilities and Exposures” (CVEs)?
  • What are credential stuffing attacks and how can they be conquered?

Archives

  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • November 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • June 2017
  • March 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • July 2016
  • June 2016
  • May 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • September 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • October 2014
  • September 2014
  • May 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • April 2012

Categories

  • Business
  • Clickjacking
  • Cyberattack
  • Data Protection
  • Electronic Signatures
  • Email
  • Encryption News
  • File Integrity Monitoring
  • Middle East & Asia
  • News
  • Penetration Testing
  • Phishing
  • Ransomware
  • Release News
  • Spoofing
  • Trojan

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About The Blog

Aiming to bring you the latest news and articles from the world of cybersecurity.

Recent Posts

  • German telecoms giant discloses data leak 4th March 2021
  • Ransomware gang hits Finnish IT services firm 2nd March 2021
  • Top tactics used in phishing attacks today 1st March 2021
  • What are “Common Vulnerabilities and Exposures” (CVEs)? 28th February 2021
  • What are credential stuffing attacks and how can they be conquered? 26th February 2021

Contact

2 Falcon Gate Shire Park
Welwyn Garden City
AL7 1TW

+44 (0) 333 150 6660

info@galaxkey.com


Discover

  • Case Studies
  • FAQ
  • Compliance
  • Legal

Galaxkey Tweets

GalaxkeyFollow

Galaxkey
GalaxkeyGalaxkey@Galaxkey·
8h

Finnish government struck by cybercrime attack
▸ https://lttr.ai/d8F3

#FinnishGovernmentStruck #CybercrimeAttack #Encryption #Cybersecurity #Cyberattack #PublicAnnouncementReleased #StatementMadeOfficially #ReceivedInternationalCooperation

Reply on Twitter 1367550234025480193Retweet on Twitter 13675502340254801931Like on Twitter 1367550234025480193Twitter 1367550234025480193
GalaxkeyGalaxkey@Galaxkey·
15h

Galaxkey Secure Workspace provides a solution to the problem of insecure file sharing by allowing users to upload and share files and folders securely.

Read more 👉 https://lttr.ai/d7AO

#CompletePeace #LatestArticle #GalaxkeyBlog #Encryption #Cybersecurity #DataProtection

Reply on Twitter 1367435723247394817Retweet on Twitter 13674357232473948171Like on Twitter 1367435723247394817Twitter 1367435723247394817
GalaxkeyGalaxkey@Galaxkey·
17h

On 17th March, investigative journalist, Geoff White will join us to discuss everything there is to know about #Encryption as a Security Solution.

🔗 Book your place here: https://bit.ly/2NDR0Dd

#Galaxkey #security #dataprotection #privacy #cyber #databreach #Distology

Reply on Twitter 1367414812821622785Retweet on Twitter 13674148128216227851Like on Twitter 13674148128216227851Twitter 1367414812821622785
GalaxkeyGalaxkey@Galaxkey·
18h

A ploy found in spam and phishing emails are malicious links staff are urged to click on.

Read the full article: Why your enterprise needs protection from spam
▸ https://lttr.ai/d6kt

#Encryption #Cybersecurity #LatestArticle #Phishing #ConstantWarUpgrading

Reply on Twitter 1367395476757184512Retweet on Twitter 13673954767571845121Like on Twitter 13673954767571845122Twitter 1367395476757184512
GalaxkeyGalaxkey@Galaxkey·
3 Mar

To help companies keep their staff and confidential files safe when using email, at Galaxkey, we have developed a secure platform with robust email security features.

Read more 👉 https://lttr.ai/d5Kl

#SafeguardingStaff #EmailSpoofing #LatestArticle #GalaxkeyBlog

Reply on Twitter 1367187854259089411Retweet on Twitter 1367187854259089411Like on Twitter 1367187854259089411Twitter 1367187854259089411

2010-2021 Galaxkey Limited. All Rights Reserved

  • Welcome
  • Products
    • Email Security
    • Document Security
    • Secure Workspace
    • Digital Document Signing
  • Technology
    • What Is The Product?
    • Who Do We Help?
  • Resources
    • FAQ
    • Case Studies
    • Compliance
    • Legal
    • Downloads
    • Datasheets
  • Connect
    • Contact
    • Book A Demo
    • Trial
    • Support
    • Partners
  • About Us
    • Our Executive Team
    • Our Investment Team
  • Blog
  • LOGIN
  • BUY
  • Download
  • Trial
  • Support