As a particular type of phishing attack, spear phishing targets from the preliminary phase a certain group, company or organization, with the intent of data stealing. The final goal might be facilitated by an identified or generic weak entry point – and the fraudulent email is tailored to suit this
The Safe Harbor Agreement is an U.S. – EU agreement between the European Commission and the United States Department of Commerce by virtue of which a Safe Harbor list is open for U.S. organizations. Once businesses meet the conditions and join the list, their European operations are considered
Doxing (doxxing) – the word – is a neologism that dates back to the 90s, when Usenet’s members posted personal information on fellow users. It basically represents the idea of compiling and releasing digital documents that lead to identity revelation when posted. “Docx” became “dox”. By the late
Software Defined Perimeter (SDP) is a new security approach currently standardized by the #cloud security alliance (#csa). The concept is basically offering an air-gapped network – in a virtual version, so that sensitive data might be secured and companies detaining such data would be better
#ransomware is an actual cyber – phenomenon . First brought to attention in 1989 (the AIDS Trojan or PC Cyborg), then mentioned somewhere back in 2005 ( Trojan.Gpcoder , then the Archiveus Trojan in 2006 that combined ransomware with RSA encryption), 2014 seems to have been its year of choice – the
Also known as keystroke or typing dynamics , keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to the inherence factors