Today, the key word on the professional level is telework or remote collaboration. Many companies around the world have adopted this model to be able to meet a need that was felt during containment. However, the popularity of telework has also increased the risks associated with computer incidents. The form that takes it, working remotely … Continue reading The dangers of telecommuting in the face of social engineering
Since the hacking of Twitter, the technique used by cyber criminals to either steal information or access one of the terminals is again on the select. Social engineering was defined by Kevin Mitnick in 2006 as "the art of using deception and lies to achieve its ends." It makes it possible, in all its simplicity, … Continue reading Social engineering
2020 was a fairly prolific year for the expression of cybercrime as a whole. Because of telework and the much increased use of computers and the Internet, hackers have never been more comfortable. This article will also interest you: Computer threats and the behavior of insurance houses According to the U.S. Federal Police, computer attacks … Continue reading Cybersecurity and computer threats
Recently, an independent study commissioned by the computer security company F-Secure, conducted by Omnisperience, showed that information system security managers are increasingly able to fend off as many computer attacks as they face on a daily basis. This is in a context where it has been observed that computer hacking methods are evolving and sophisticated. … Continue reading Cyber Threats and the Response of Information System Security Managers
It was recently discovered, a personal database from Facebook whose access is completely free on the internet. This database contains hundreds of millions of phone numbers and other personal information. According to the information received, this is personal data that leaked because of a security breach that was corrected in 2019. "These are old data … Continue reading Would Facebook have been the victim of a data leak?