3007, 2019

A primer on watering hole attacks

By |July 30, 2019|Categories: Security|Tags: , , , , , , |

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these [...]

1704, 2018

Beware of watering hole attacks!

By |April 17, 2018|Categories: Security|Tags: , , , , , , |

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering [...]

Go to Top