Domain Squatting: What to do if Your Domain is Being Held Hostage

Domain Squatting: What to do if Your Domain is Being Held Hostage

The Internet is a vast place. It is estimated that there are close to 2 billion websites online in 2022. Each of these websites has a unique hostname, or ‘domain’, that can be resolved into an IP address.

Whilst anyone can access these websites, one should note that some domains are more ‘valuable’ than others. Domains that include relevant keywords are more likely to show at the top of search engine results, directing more traffic to those sites. For example, a Google search for “how to make a voicemail” may direct you to websites with the word ‘voicemail’ in the domain name.

(more…)

UK Government Releases Free Tool to Check Email Security Risks

UK Government Releases Free Tool to Check Email Security Risks

According to Paul Maddinson, NCSC director of national resilience and strategy, the new Email Security Check tool aims to assist users in discovering where they can do more to avoid spoofing and preserve privacy and provide practical advice on how to stay safe. Moreover, by implementing the recommended activities, organizations may strengthen their defenses, demonstrate that they are taking security seriously, and make life more difficult for cyber thieves.

(more…)

6 Tips to Effectively Deal With Returning Emails

6 Tips to Effectively Deal With Returning Emails

Are you having issues with email bounce-backs and returning emails? You probably know just how annoying this can be. We all want to send out emails without having them returned.

Today, we will talk about returning emails to help you understand what causes them, how they work, and what you can do to prevent them. (more…)

9 Best Practices to Manage Sensitive Data Carefully

9 Best Practices to Manage Sensitive Data Carefully

The EU’s General Data Protection Regulation (GDPR) defines sensitive data as any material that discloses a data subject’s information that is mostly protected and, in general, cannot be processed. Sensitive data includes a subject’s race/ethnicity, health (mental) condition, religious beliefs, political ideologies, biometric data, genetic data, and trade union memberships.

(more…)

TraderTraitor: Targeted Attack on Blockchain Organizations

TraderTraitor: Targeted Attack on Blockchain Organizations

Recently, the North Korean cyberattack group, Lazarus, has been launching cyberattacks targeted at stealing cryptocurrencies laundered to North Korea. These attacks have been going on since 2020; more recently, they have alerted the U.S. government, FBI (Federal Bureau of Investigation), and CISA (Cybersecurity and Infrastructure Security Agency). Here’s everything you need to know about the cybersecurity threat. (more…)

Pin It on Pinterest