Believe it…despite the best technical defences, if the human is not secure then the system isn’t either Real-world example: 2016 Democratic National Committee (DNC) hack. […]
Not quite…the Twitter accounts of several high-profile influencers were accessed to facilitate a widespread social engineering attack. Not everyone is who they say they are. […]
Believe it…there are many types of cyberattacks where https could have prevented or mitigated the attack, primarily those involving Man-in-the-Middle (MITM) attacks. Real-world example: The […]
Not quite…ignoring warnings and failing to apply patches to your system can lead to devastating consequences. Target found out the hard way. Real-World Example: Target […]
Believe it…exploits created by our national security agencies are used by criminals to steal information and disrupt operations for money. Real-World Example: EternalBlue One of […]
Believe it…flimsy financial firewalls permitted a huge breach of customers’ data. Firewalls don’t always prevent breaches. Layered security is important, and humans play a critical […]
Believe it…attackers use “trusted” brand names to launch their attacks Real world example: The Case of the “Google Docs” Phishing Scam One of the most […]
Believe it…gamers denied retailers thousands of pounds of revenue The Dyn Attack: The Day the Internet Broke On October 21, 2016, a massive DDoS attack […]