Jump to content
PC Security Forum


  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. lindagray

    Phishing Attacks

    Album about Phishing Attacks, which are the attempting to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like clicking on a malicious link or attachment—or willfully divulging confidential information.
  2. lindagray

    Anti Spam Symbols

    Album of Symbols of Anti Spam Software
  3. lindagray

    Best AntiVirus Software

    AntiVirus Software Comparison
  4. Almost all of the IT pros we talk to at KnowBe4 agree that end-users are their number one headache when it comes to cybersecurity and managing that problem continues to be a big challenge. Social engineering is by far the easiest way for hackers to gain access, either tailgating through the side door or phishing employees via email and other attack methods. It is now a must to protect against phishing threats by educating end users. The IT teams that get the approval from management to do this get great results. Apart from budget issues, sometimes there is resistance at the C-level to se
  5. Nobody wants to fall prey to a phishing scam. There’s a good reason that such scams will continue, though: They are successful enough for cybercriminals to make massive profits. Phishing scams have been around practically since the inception of the Internet, and they will not go away any time soon. Fortunately, there are ways to avoid becoming a victim yourself. Here are 10 basic guidelines in keeping yourself safe: 1. Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadverte
  6. If a random person with an official-looking business card approached you and asked for your Social Security card, driver’s license and other sensitive information, you probably wouldn’t give it to them. For one reason or another, however, people are more easily duped when it comes to online interactions. It’s far easier to trick users, which is why phishing attacks are so rampant. Phishing refers to the act of obtaining victims’ sensitive information by posing as trusted companies and organizations. It is usually carried out through spoofed emails and spoofed websites that urgently ask fo
  7. Phishing is a serious problem that is achieved in a number of different ways. Email spoofing and website spoofing are two of the primary methods by which phishers acquire sensitive information from unsuspecting Internet users. While email spoofing and website spoofing are sometimes used separately, they are often used in concert with each other. For example, a spoofed email is used to lead a victim to a spoofed website; the spoofed website requests sensitive financial information or login information from the victim. In this way, a successful phishing attempt may be undertaken.
  8. Credit Card Phishing Scams In our digital age it’s easy to monitor your credit card accounts online. But are you taking every precaution to protect those accounts from phishing attacks? Many people are so busy and pressed for time that they assume that every email they receive from their credit card company is legitimate. The backbone of any successful phishing attack is a well-designed spoofed email or spoofed website, which is why it pays to have a healthy level of skepticism when it comes to opening emails and visiting websites. Learn more about the basics of credit card phishing sca
  9. There are a number of different techniques used to obtain personal information from users. As technology becomes more advanced, the cybercriminals' techniques being used are also more advanced. To prevent Internet phishing, users should have knowledge of how the bad guys do this and they should also be aware of anti-phishing techniques to protect themselves from becoming victims. Spear Phishing While traditional phishing uses a 'spray and pray' approach, meaning mass emails are sent to as many people as possible, spear phishing is a much more targeted attack in which
  10. As widespread and well-known as phishing is now, it hasn’t been around forever. Although the practice originated sometime around the year 1995, these types of scams were not commonly known by everyday people until nearly ten years later. That doesn’t mean that phishing was not a force to be reckoned with right from the start. In order to avoid falling prey to such scams yourself, it is helpful to have a basic understanding of the history behind them. Name Origins Phishing scams use spoofed emails and websites as lures to prompt people to voluntarily hand over sensit
  11. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. The first phishing lawsuit was filed in 2004 against a Californian teenager who created the imitation of the website “America Online”. With this fake website, he was able to gain sensiti
  12. SCALABILITY OF ANALYTICS FOR YOUR DDOS DEFENSE No matter which deployment mode and detection method you’ve chosen, it will all be for naught if you can’t scale up in order to adequately protect your entire network. After all, DDoS attacks work because of the sheer amount of traffic they can throw your way, so your mitigation system needs to be able to handle large numbers of packets. You should also keep the scalability of your analytics infrastructure in mind. For example, a flow sampling method can be easily scaled, but it sacrifices granularity and mitigation speed. Meanwhile, mirror
  13. HOW TO PREVENT DDOS ATTACKS As you can see after examining the five most famous attacks, DDoS attacks aren’t going away. In fact, they’re only growing larger and more destructive. So, the best thing you can do to prevent being a victim of one yourself is learn from attacks that have already happened. Here’s how you can start thinking about DDoS protection: CHOOSE A DEPLOYMENT MODE There are benefits to both proactive and reactive DDoS deployment modes, and which one you choose depends on your business goals. A proactive mode delivers the highest resolution detection capabili
  14. THE SECURITY THREAT OF A DDOS ATTACK More importantly, in many cases a DDoS attack is merely designed to distract from other criminal activity, such as data theft or network infiltration. The attacker keeps its target busy fighting off the DDoS attack, to then sneak in a piece of malware. FIVE MOST FAMOUS DDOS ATTACKS In recent years, DDoS attacks have only been increasing in both frequency and severity. Here, we’ll examine five of the largest and most famous DDoS attacks. 1. GITHUB: 1.35 TBPS On Feb. 28, 2018, GitHub—a popular developer platform—was hit with a sudden onslaught
  • Create New...