Social media has transformed the way consumers seek information, communicate with one another and interact with businesses. According to Statista, in Nigeria alone; there are […]
Category: Threat
Key Findings from the Internet Organized Crime Threat Assessment (IOCTA) 2021.
Key findings from the Internet Organized Crime Threat Assessment – IOCTA for 2021 from Europol covered interesting areas like cyber-dependent crime, child sexual exploitation material, […]
Defending against account takeover (ATO) attack.
Account takeover is a form of identity theft and fraud, where a malicious third party successfully gains access to a user’s account credentials. A successful […]
Proactive Defense Against Business Email Compromise (BEC)
What is Business Email Compromise Business Email Compromise (BEC) is a type of attack in which the attacker poses as a trusted entity typically a […]
The QR Code Attack Vector
QR stands for “Quick Response” and QR codes are square-shaped machine-readable data formats that are useful for anything that needs to be scanned automatically. Before […]
A Walkthrough of DARPA SSTIH Program-Mitigating Hardware Issues from Source.
DARPA and Galois Inc. DARPA is an agency of the U.S. Department of Defense with a mission to make pivotal investments in breakthrough technologies for […]