IT Infrastructure

WHAT IS NON-MALWARE BASED ATTACK

It can also be referred to as non-technical attack as no special technical skill is required to perpetrate such attack. A form of social engineering attack whereby cyber criminals leverage personal interaction and social skills. Sometimes refer to as a non-technical attack. Business Email Compromise (BEC), CEO fraud, or Whaling, are all examples of non-malware…

IT Infrastructure

HOW CYBER ATTACKS WORK; HOW HACKERS INFECT SYSTEMS

Mode of malware delivery  1. Social engineering and phishing  Social Engineering SE in the context of Information Security, is the act of psychologically manipulating someone to divulge vital personal information (such as password, transaction PIN, username) through personal interaction and social skills. Attackers play around online users mental intelligence by tricking them to believe the…

IT Infrastructure

WHAT MALWARE IS ALL ABOUT

Malware is any software (program code) that is purposely designed to carry out malicious action; steal and destroy vital sensitive information and data. Sometimes, malware goal is to disrupt and make network resources unavailable to the authorized users. We have file-base, and fileless malware. Forms of Malware  There are more than 20 forms of malware,…

IT Infrastructure

TOP SOURCES OF CYBER ATTACKS

The major sources of cyber attacks for an organization can be classify into  Internal and External sources. Internal sources: These are majorly people legitimately granted access to company network and digital resources, but abuse the access due to their selfish interest and ulterior motive. It can be disgruntled current or former employees, a disloyal third…

IT Infrastructure

HOW TO SECURE BUSINESSES CLOUD-BASED APPLICATIONS

With increase in the adoption of cloud based application by SMEs due to the affordable and predictable cost of maintenance, flexible remote workforce, predictable data recovery, among others, security remain a point of concern as the cloud providers are only saddled with security responsibly in their cloud environment thereby customers  take responsibility for security blunders…

IT Infrastructure

HOW TO SPOT FAKE BANK APPLICATION

It is no more news, there are fake bank apps on Play Store. People are being scammed daily. If you have not fallen victim does not mean the SCAM is not real. Popular banks applications are often the targets. People’s data are being compromised daily via the download of these fake apps. Cyber criminals target…

Security

SEE HOW DMARC STOPS MAN-IN-THE-MIDDLE ATTACK!!!

For those that do not know what DMARC is, check here: https://www.blog.a-jevertonnetworks.com/what-is-dmarc-and-how-it-works/ As we know DMARC leverage two authentication standard (DKIM & SPF). With DKIM, every email sent is signed with a private key which the receiving mail server validated with corresponding public key in the DNS. This is to verified the message is not…