Trustaira Blog
April 21, 2024        Trustaira Staff

In traditional security assessment, security professionals try to conduct penetration test, ethical hacking and so on. The security professionals think that if they can find vulnerabilities via conducting bug bounty or penetration testing, those vulnerabilities can be fixed and they are secure from cyber-attacks. But the real hacking is often quite different from penetration testing attacks, ethical hacking or this kind of staffs. In reality,…

Read More »

 
May 17, 2021        Trustaira Staff

E-Mail Phishing Attack Overview A social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about a company (your financial institution) or its computer systems. The attacker can look like anyone, and could fool you by saying they’re a repairman, or a new intern or employee, and they could actually have identification that says they work for your institution. They’ll…

Read More »

 
March 25, 2020        Trustaira Staff

The spread of the novel Coronavirus (COVID-19) is forcing many organizations to require their employees to work remotely. While it might mean that we can work comfortably from our home, this also puts our cyber security at high risk as the world is now seeing a huge spike in Corona themed scams, text messages, malware attacks, phishing activities and more. New hacking campaigns are lunched…

Read More »

 
April 29, 2018        Trustaira Staff

The acronym SQL (pronounced SEQUEL) stands for Structured Query Language, a language for querying and editing information stored in a certain database management system. SQL was developed in the early 1970s by some people working for IBM. Short after that, in 1979, a company called Relational Software, which later became Oracle Corporation,  released its own modified version of SQL. Today, SQL is used in many products, including…

Read More »

 
February 20, 2018        Trustaira Staff

  A malicious insider is a trusted insider who abuses his/her privileges in a system to hinder the system’s operations, damage data, or disclose sensitive information which causes damage to the system. Malicious insider threat is one of the most dangerous threats to any organization. By being an insider, he/she have already gotten past your first defense and they might be interested by a desire…

Read More »