Are Cyber Criminals Hiding in your Office365 Right now?

A few weeks ago, a local company approached us because they had parted ways with their IT provider. The new company owner was very switched on but had just fallen victim to a £100,000 cybercrime hoax. You see cybercriminals had managed to gain hold of his accounts personnel Office365 credentials...

Security Stop-Press : Phish Kits That Can Beat Multi-Factor Authentication

Enterprise security company, Proofpoint, has warned that cyber criminals have found a way to beat multi-factor authentication by using phish kits. The kits leverage transparent reverse proxy, enabling them to man-in-the-middle (MitM) a browser session, steal the multi-factor authentication tokens, and bypass this trusted layer of security.

Featured Article : What Are Disposable Emails?

In this article, we look at what disposable email addresses are, their benefits and disadvantages, and we look at a few examples of disposable email address services. What Are Disposable Email Addresses? Disposable / temporary email addresses (DEA), also known as ‘burner’ email addresses, are (mostly free) services that allow...

Tech News : Windows Updates Can Take 8 Hours

According to new research by a Microsoft program manager, it could take as long as 8 hours, connected to the Internet, for devices to fully download Microsoft updates. The Update Challenge – Time A blog post in Microsoft’s Tech Community by program manager David Guyer, highlighted how one important challenge...

Name(Required)