Category: Cybersecurity

I heard My IT Guy Say LLM

What is LLM? Large Language Models (LLMs) are like the brainy know-it-alls of the computer world, but way cooler because they don’t brag about their SAT scores. Imagine a robot that’s swallowed a library...

Man in the Middle Attack

What it is? This type of attack happens when a malicious actor introduce themselves in between you and the other systems/network you are communicating with. Analogy Passive strategy – John and you are in...

Virus

The “I Would update it Later” Virus

The “I would update later” virus is one of the most common infections, and it is 100% preventable. The most effective attack vector takes effect from humans. Social engineering, weak password, and not updating/upgrading...

To Update Or Not To Update, That is The Question

The majority of us, if not all, have seen the message that says “Press Here to Update now or Schedule for Later.” I am sure that 99.9% of the time you press the let’s...

6 Simple Ways to Be Safe While Online

The Cyberworld is full of risk, on this post I would like to give you six technics that will help reduce your risk surface. The first recommendation on the list is the most important...

Be Aware, Never Scared

If you do not use our…, if you click that link.., if you don’t change your password…. Have you heard these phrases from cybersecurity professionals or marketers before? I am sure you have. This strategy...

The Solution for Security Uncertainty

Reality The reality is that we will never know when are you going to be hacked or be able to eliminate all possible risks to a system, network or application. Dealing with the reality of...

Interesting Facts About the Recycle Bin

Delete Doesn’t Mean Destroyed I am pretty sure most of you think that when you delete a file or move to the recycle bin, it is removed from the system and is not recoverable....

The Biggest Mistake Many of Us Make Online

How many of you log off your accounts after completing a bank transaction? Hopefully, this is your normal process while on a shared or public computer but, even in your private system, it is...

The Weakest Link on the Chain, Discovered By Phishing

Do you remember those African Prince emails? Well, the new technics used by an attacker are not as easy to identify anymore. One of the differences between those emails and the latest ways used by attackers...