Sep 15, 2021
You can’t always trust online forms. Even if hosted on a credible website, they may be used to capture and steal your sensitive information for nefarious purposes. Form grabbing, for instance, is a cyber threat in which a hacker uses online forms to steal the...
Apr 28, 2020
Cyber criminals use a myriad of techniques to carry out their digital attacks against unsuspecting victims. While you’re probably familiar with malware, including viruses and ransomware, a lesser-known cyber threat is spoofing. What is spoofing exactly, and how...
Jan 17, 2020
The terms “cyber threat,” “vulnerability” and “risk” are often used interchangeably when discussing malware, intrusions and other attacks against an information technology (IT) infrastructure. While similar, though, they...