All posts
Category

Uncategorized

61 posts in this category

What is Email abuse ?

What is Email abuse ?

Anyone can send an email to anyone else, within seconds, at zero apparent cost. That is the greatest strength of the Internet […]

Mar 22, 2021Read more
What is Phishing ?

What is Phishing ?

Definition The term phishing is a general term for the creation and use by criminals of e-mails and websites – designed to look […]

Mar 15, 2021Read more
The Phishing surge amidst Covid 19

The Phishing surge amidst Covid 19

Did you mask your network as well during COVID-19? COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, and there is [&helli

Feb 8, 2021Read more

What is SPF ?

Sender Policy Framework (SPF) is an email validation system designed to detect and block forged or spoofed emails. This is done by verifying […]

Feb 8, 2021Read more

Emotet البرمجيات الخبيثة التي تعرض علي الناس هذا عيد الميلاد, من خلال غريتا ثونبرغ تحت عنوان رسائل التصيد الاحتيالي

تم اكتشاف مخطط بريد الكتروني غير مرغوب فيه عالمي يستخدم الناشطة البيئية السويدية غريتا ثونبرغ تحت عنوان رسائل الكترونيه لجذب المستخدمين. البريد […]

Dec 24, 2019Read more
DMARC feature image

DMARC Policy: Essential Guide

DMARC that stands for (Domain-based Message Authentication, Reporting, and Conformance) is a type of email protocol that uses SPF (Sender Policy Framework) [&he

Jul 21, 2019Read more

What is Ransomware?

Ransomware is a type of malicious software or Malware. In other words, we can say it is a subset of Malware, it […]

Dec 1, 2018Read more

What is Vishing?

Vishing is phishing’s mobile counterpart. It is defined as the act of using the telephone in an attempt to scam the client […]

Nov 16, 2017Read more

ما هي الهندسة الاجتماعية ؟

الهندسة الاجتماعية هي المصطلح المستخدم لمجموعه واسعه من الانشطه الخبيثة التي يتم إنجازها من خلال التفاعل البشري. وهو يعرف بأنه فن استغلال […]

Jul 9, 2017Read more

What is Cybercrime?

Cybercrime is on the rise in today’s tech world. Criminals on the World Wide Web are exploiting the personal information of Internet […]

May 17, 2017Read more