What can criminals do with my email address?
Personal and company email addresses can provide cybercriminals with a wealth of new opportunities to execute their schemes and scams. Infiltrated email addresses can supply…
Personal and company email addresses can provide cybercriminals with a wealth of new opportunities to execute their schemes and scams. Infiltrated email addresses can supply…
Orange, the French telecom company that services over 260 million customers around the world, has recently confirmed it was hit by a ransomware assault that…
Spoofing an email address is far easier than most people realise, and among the main reasons why phishing campaigns have become a prevalent problem in…
Dozens of verified Twitter accounts belonging to high-profile individuals, including former US President Barack Obama, and entrepreneurs and philanthropists like Elon Musk and Bill Gates,…
A dedicated auction site that enables people around the world to bid in real-time on auctioned listings has now disclosed an extensive data hack. LiveAuctioneers…
A previously unknown form of ransomware has been identified which encrypts a victim’s files by making use of an encryption tool that was devised by…
While mail providers are constantly updating their filters to flag spam messages or hinder them reaching inboxes, sometimes this malicious mail gets past defences. While…
With the platform release of version 5.6.7 Galaxkey has incorporated two powerful features with Galaxkey Workspace Unzip Files – you can now easily unzip files in…
What is Digital Identity Authentication? Digital identity authentication is becoming the new norm for cybersecurity products. In short, it uses biometric identification to authenticate access…
The ability to communicate clearly and easily with colleagues and clients is a key element of every successful organisation. However, to safeguard confidential company information,…