Cyber Talk

Deepfake: What They Are, How to Recognize Them

In recent times, the proliferation of fake news supported by seemingly authentic images has become increasingly common. This particular form of multimedia manipulation is referred to as a deepfake. One of the most striking examples is the fake photo depicting the explosion at the Pentagon, which led to a significant stock market crash. Another instance

Safeguarding Your Privacy: How to Protect Against Camfecting Attacks

Camfecting Attacks Introduction: With technology's rapid advancement, online privacy and security have become increasingly vulnerable. Camfecting, a malicious attack that hijacks a device's webcam without authorization, is a significant concern in the digital landscape. In this article, we will explore what camfecting entails, its modus operandi, the risks it poses, and provide actionable steps to

Malware: What They Are and How to Protect Your PC and Data

When it comes to cybersecurity, we often think of high-level hackers stealing crucial government and corporate data. In this article, we will delve into an important and often underestimated topic that affects many individual users: malware. While the term may sound like something out of a science fiction movie, it is actually a much more

What are spyware and how do they work

Spyware is malicious software programmed to collect information without the user's knowledge: as the name suggests, it acts as a spy. As such, once it enters the targeted electronic device (computer, smartphone, tablet), it can observe and record everything that is stored there, from passwords to contacts in the address book, and all the activities

How to Create a Strong Password in 10 Easy Steps

Creating a secure password is one of the first steps that users should consider to protect their accounts - and therefore their data - online. In today’s digital world we use passwords to access a lot of information, from email to social networks, to banking applications and more. Basically, if someone could have your password,

Phishing Kits: The New Frontier of Hacker Attacks

The exponential growth of online fraud is mainly due to the emergence of fraud scams. Compared to more common forms of fraud, phishing is a lot more dangerous and accessible to all. The latest quarterly report of the Anti-Phishing Working Group APWG confirms this, revealing that only in January-March 2021, there were over 611,000 phishing

Phishing e-mails and their risks 

Phishing e-mails and their risks. A phishing email or SMS (in the case of text messages, this is referred to as SMiShing) is a fraudulent message created to appear authentic, typically requiring you to provide sensitive personal information in various ways. If not examined carefully, however, it is not easy to distinguish phishing emails or

February 15th, 2023|Cyber Talk|0 Comments

Brand phishing: which brands are most used by cyber criminals?

Whilst phishing attacks continue to become more sophisticated, it is possible, through Ermes technology, to collect data and insights on those attacks.   In this article Ermes offers several interesting observations and insights, such as the most phished categories as well as the brands they most frequently target.  We will also take a deeper dive into

December 6th, 2022|Cyber Talk|0 Comments

3 types of phishing attacks that target your company

New Trends and Phishing Attacks: What are the new trends in phishing attacks? The goal of the article is to provide an overview of the latest phishing attacks, to create awareness and offer concrete solutions Phishing attacks have steadily increased worldwide during 2021-2022 with a devastating cost for each successful data breach. Moreover, these attacks

November 30th, 2022|Cyber Talk|0 Comments
Go to Top