Why Smartphones Are More Susceptible To Social Attacks

Several research studies point to customers being substantially much more vulnerable to social attacks on their smartphones. This is the case for email-based spear phishing, spoofing attacks that try to imitate genuine webpages, as well as attacks by means of social networking sites. The reasons for this originate from the way mobile devices are designed […]

Data Security in the Cloud: Part 2

In Part 1 of the article, we discussed some major vulnerabilities stemming from cloud-sharing services, including opening emails from unknown addresses due to routinization, lack of a personal stamp on such emails causing lack of authenticity, unverifiable hyperlinks, and ultimately, the violation of cyber safety training drills. In Part 2, we will explore the solutions […]

Data Security in the Cloud: Part 1

Today, most users perceive the cloud as safe online software and operating environments, online backup, storage, and file-sharing systems. From Chrome OS, Google’s App Engine, to iCloud, users rely on these systems in today’s technological age, basking in its various resourceful benefits including capabilities for predicting and reacting to adverse events, lowering the possibilities of […]

Scroll to top