Why Smartphones Are More Susceptible To Social Attacks

Several research studies point to customers being substantially much more vulnerable to social attacks on their smartphones. This is the case for email-based spear phishing, spoofing attacks that try to imitate genuine webpages, as well as attacks by means of social networking sites. The reasons for this originate from the way mobile devices are designed […]

Data Security in the Cloud: Part 2

In Part 1 of the article, we discussed some major vulnerabilities stemming from cloud-sharing services, including opening emails from unknown addresses due to routinization, lack of a personal stamp on such emails causing lack of authenticity, unverifiable hyperlinks, and ultimately, the violation of cyber safety training drills. In Part 2, we will explore the solutions […]

Scroll to top