Cyber Made Easy Blog

The Weakest Link on the Chain, Discovered By Phishing

Do you remember those African Prince emails? Well, the new technics used by an attacker are not as easy to identify anymore. One of the differences between those emails and the latest ways used by attackers...

Skype Desktop Vulnerability

A several weeks ago, Microsoft was informed of a vulnerability (a hole) affecting the Skype application. Since Skype is part of the Windows OS, and you do not have to go out of your...

What is an IoT?

Have you ever heard this phrase on the news before? “IoTs are dangerous, they have been used in Distributed Denial of Service (DDoS) attacks” Then you ask yourself, are they talking about some type of venereal disease? Well,...

Hello World! Welcome to the Cybersecurity World

We are here to offer you a simpler view inside of the Cybersecurity world so you can use that information to better protect,  not only yours but your family’s privacy. We are a group of cybersecurity...