TechGuard Blog


Understanding the Difference Between Vulnerability Assessments and Penetration Tests

Being cybersecurity professionals, we hear companies stating time and time again that they’ve had a Penetration Test only to find out through more in-depth conversation they in fact had a Vulnerability Assessment. Why do so many companies get these...

Traveling Cyber Safe in 2021

The pandemic is not over, but we are heading in the right direction. More people are gaining access to vaccinations, and COVID restrictions have loosened up, which means we are starting to see airports fill up with travelers again. That's good news,...

Amazon Is Now Sharing Your Internet With Strangers, Unless You Opt-Out

On June 8th, Amazon released a new mesh network dubbed Amazon Sidewalk for all Amazon products ranging from Echos to Ring Doorbells. Sidewalk is intended to help keep these gadgets running in the event your home internet experiences an outage. How? By...

Google Hacking: Use It to Make Your Organization More Secure.

Google Hacking (also called Dorking) is an information-gathering technique used by hackers to find significant, valuable, and sensitive information right from a google search. This search feature built by google was intended to serve as a way for...

The Rise and Fall of DarkSide Ransomware

The ransomware gang behind the recent Colonial Pipeline attack earlier this month has been reported to have received upwards of $90 million in ransom payments over the last nine months. That follows a spree of ransomware dispersed by DarkSide, leading...

Major Pipeline Attacked with Ransomware

On Friday, May 7th, Colonial Pipeline announced that ransomware, one of the most common forms of cyber-attack, had affected their systems. The attack halted all pipeline activities through which Colonial supplies the east coast with 45% of its liquid...

How Businesses Can Combat Password Complacency

Passwords – we all know their importance and why they need to be secure. So why do so many people still have trouble with hackers guessing their passwords and getting into their accounts? Well, it seems that not enough people are putting their...

Large Breaches Prompt Focus to Zero-Trust Security

Since the SolarWinds hack that affected multiple government agencies, the U.S desperately needs to explore other options for protecting its networks. That calls for a strategy centered around the idea that an organization should not trust anything....

How Social Engineering Can Improve Your Cybersecurity

You would be forgiven for thinking that social engineering sounds like something from science fiction, but it is very real. Social engineering is one of the most effective tools in a cyber criminal’s arsenal because, quite frankly, hacking a human is...

Hackers Can Ban Your WhatsApp Account Remotely – All They Need Is Your Number

A new vulnerability in WhatsApp allows hackers to suspend and even ban your account without ever needing to access it. That’s concerning coming from a platform with over 2 billion users. The attack is also not very sophisticated either, in fact,...

Why You Need to Invest in Penetration Testing

Cybersecurity is becoming more necessary as our society continues shifting towards digitalization. As a result, cybercrime is increasing rapidly, and companies are realizing the value in securing their systems and networks. Many companies pay a lot of...

One Year Later – How COVID-19 Affected Cybersecurity

Covid took the world by storm roughly a year ago, changing daily life as we knew it. Then, while everyone was busy trying to avoid the virus, cybercriminals were already figuring out how to capitalize on it. The confusion and desperation created a...

1 2 3 4 5

 


 

Read More Articles →