How often have you received an email (or for that matter an instant message) with marketing graphics embedded into it? I am guessing all the time? These marketing graphics are image files (GIF, JPG, PNG) that are added to the message. Remote Images Cyber criminals often include images in their phishing messages to represent the... Continue Reading →
Cyber Attacks 101 – A Pocket Guide
A Cyber attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to, or make unauthorized use of, a computer system. This can be anything from big servers to your smartphone and anything in between. There are various forms of Cyber Attack. The following list are just examples: Brute Force Attack/Dictionary... Continue Reading →
Email Tracking
For the most part email has given way to a number of instant messengers (e.g. Facebook Messenger, WhatsApp, Telegram) as well as messaging through social media for most consumers. However email continues to be significant means of communication in the business setting. What may not be well known is that email can be tracked very... Continue Reading →