Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security…
When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…
What is WebAuthn? WebAuthn (Web Authentication API) is a global standard specification for secure authentication on the Web, formulated in…
Multi-factor authentication (MFA) is one of the most highly recommended security measures in this age of brute-force attacks, data breaches…
As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…
“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…
A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…
Privilege abuse - that is the security threat that your business’s IT team is most worried about. According to a…
Ever heard of the butterfly theory? A single flap of a butterfly’s wings in Australia has the potential to cause…
Whether or not you know what it is called, you have likely used 2FA at least once in your life…