Home » Web Security

Web Security

email security

Email Security: Understanding DomainKeys Identified Mail (DKIM)

Email phishing campaigns and Spamming have become so common today. Indeed, global traffic estimates suggest that as many as 73% of emails you may receive daily are just unwanted promotions for products and services. To put it into perspective, at least seven in every 10 emails you are likely to receive are promotions. With increased …

Email Security: Understanding DomainKeys Identified Mail (DKIM) Read More »

phishing campaign

Phishing Campaign Targets cPanel Users’ Credentials

Cybercriminals have devised a new phishing campaign with the aim of harvesting users’ cPanel credentials. Urgent security measures have helped limit the effectiveness of the malicious campaign. Nonetheless, users are advised to be on high alert. Users have in the recent past reported phishing campaign aimed at tricking them into giving away their cPanel and …

Phishing Campaign Targets cPanel Users’ Credentials Read More »

ecommerce threats

E-commerce: Security threats you should keep your eyes on

The online market has taken the world by the storm, with a dramatic shift seen in the move from physical stores to the web in recent years. Technological advancements and the convenience of online stores have attracted the lion market share of buyers, fuelling an upward trajectory in the growth of online businesses, away from …

E-commerce: Security threats you should keep your eyes on Read More »

email security

Email Authentication Protocols: DMARC

Even in the wake of digitization and the explosion of new technology, such as social media, emails continue to be the centrepiece of digital communications in businesses. Notably, with most people checking their emails first thing in the morning, it’s easy to see why emails are the cornerstone in delivering effective personal and business communication. …

Email Authentication Protocols: DMARC Read More »

Eclypsium: Vulnerability -dubbed ‘BootHole’ – attack Windows and Linux systems using GRUB2 and Secure Boot

Details published by Eclypsium on July 29, 2020, revealed a discovery by Eclypsium researchers, Mickey Shkatov and Jesse Michael on a vulnerability — dubbed “BootHole” — in the GRUB2 bootloader utilized by most Linux systems. GRUB2 is used as the primary bootloader for all major Linux distros, but it can also boot and is sometimes …

Eclypsium: Vulnerability -dubbed ‘BootHole’ – attack Windows and Linux systems using GRUB2 and Secure Boot Read More »

Scroll Up Scroll to Top
error: