Analysis
How DNS Hijacking Threatens You Online
Thumb dns hijacking

Normally, when users enter a domain name into the browser, the Domain Name Server (DNS) maps it into its corresponding IP address. A DNS attack occurs when the malware overrides the TCP/IP settings of the system, to redirect queries made to the DNS. The individual behind the attack directs traffic to a website of choice. DNS hijacking occurs in two ways. One method infects computers with malware, rendering it incapable of translating the domain address entered by the user to its matching IP-address. The other method involves hacking specific websites and changing their DNS addresses.

 ...

» Read more
Practical Advice
Dangers of Insider Threats to companies data
Thumb internalthreats

When it comes to cyber security threats, insider threats rank amongst the top culprits. One of the main reasons they are dangerous is because companies give more priority to other frequent threats such as malware attacks, hacking, and ransomware attacks among others. In addition, insider attacks may not be entirely malicious, with most of them being accidental. However, in this age of technological advancement where we are witnessing unprecedented growth in cloud storage, companies face even bigger threats in ensuring their data is safe.

 

How it happens

It can accidentally happen when...

» Read more