Remove Digital transformation Remove Encryption Remove Social Engineering Remove Threat Detection
article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

With quantum computing looming in the not-so-distant future, the way that we think about encryption will need to evolve. However, the complex math behind creating encryption keys is no match for the power of quantum computers. With 128-bit key encryption, it could take trillions of years to find a matching key.

Risk 134
article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. How do hackers use social engineering? Encrypt all sensitive company data. OnePercent Group attacks.

article thumbnail

Phishing-resistant MFA 101: What you need to know

CyberSecurity Insiders

The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. ATO is often initiated by credential theft and can be done using social engineering techniques (phishing attacks) or by bombarding login pages with bot-based attempts.

Phishing 109