• Skip to main content
  • Skip to footer
Menu
  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • Network Security 
    • Cloud Security 
  • Compliance
  • Sectors
  • Blog
  • Contact

Cyber security news

Jan 06 2020

Measures taken by WhatsApp to avoid spam

WhatsApp has designed various tools and features to help us stay secure but it is still used to spread malware and spam. It has the option of control of who sees your personal information like last seen, profile photo, status, and others. You have an option to block a contact if you don’t want to interact. There are more than 1.5 million WhatsApp users and over 1 million receives spam messages … [Read more...] about Measures taken by WhatsApp to avoid spam

Written by kamran · Categorized: Cyber security news, Cyber security tips

Dec 29 2019

What is Magecart? How it works and how to prevent it?

Magecart is an association of cybercriminal who targets online Magento shopping cart systems and steal customer payment card information. It is also known as a supply chain attack. The reason behind these attacks is to compromise the third party piece of software and get information about their clients. Shopping carts are attractive because they carry payment information of the customer and … [Read more...] about What is Magecart? How it works and how to prevent it?

Written by kamran · Categorized: Cyber security news, Cyber security tips

Dec 14 2019

What is Encryption and its common types

cyber secuirty

Technology has made our lives easier and more efficient these days. But with the increase in the use of technology, it is important to protect your data from cyber-attacks. Organizations and individuals use different techniques and technologies to protect their data and one of them is encryption. Encryption is a process of using an algorithm to make it inaccessible or readable for an unknown … [Read more...] about What is Encryption and its common types

Written by kamran · Categorized: Cyber security news

Nov 03 2019

Attacker’s phish Office 365 users with fake voicemail messages

The cybercriminal is targeting office 365 constantly as they can get access to high-value company data and systems. The attackers have used a new game to attack office 365 by using an audio file hidden as a voicemail to trick the user and their password. Office 365 observed the campaign over the past few weeks, and the targeted organization were finance, IT, retail, insurance, manufacturing, … [Read more...] about Attacker’s phish Office 365 users with fake voicemail messages

Written by kamran · Categorized: Cyber security news, Cyber security threats

Oct 29 2019

Four significant changes coming to cybersecurity in 2020 and beyond

cyber security

Some extraordinary changes have been observed in enterprise security development. Security analyst believes that these changes will become more frequent and visible in 2020. Having a proper Cybersecurity has become a business-critical, incredibly dynamic, massively scalable, and highly specialized discipline. However, some companies are still using disconnected point tools, manual processes, … [Read more...] about Four significant changes coming to cybersecurity in 2020 and beyond

Written by kamran · Categorized: Cyber security news, Cyber security threats, Cyber security tips

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Interim pages omitted …
  • Page 22
  • Go to Next Page »

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
© 2026 INFOGUARD. All Rights Reserved.
Linkedin-in
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
  • Privacy Policy
  • Terms of Use
  • Acceptable Use