Securityco73918 Profile Banner
Security controller Profile
Security controller

@Securityco73918

Followers
5
Following
267
Media
109
Statuses
516

Security controller is a blogging site with all information relate to security and awareness

Joined March 2024
Don't wanna be here? Send us removal request.
@Securityco73918
Security controller
24 days
Proactive training is a critical step in equipping every employee to play their part in a cybersecurity strategy. In this article, we will cover how to identify fake email addresses and fake websites and offer some pro tips for better security awareness training.
0
0
1
@Securityco73918
Security controller
25 days
RT @Securityco73918: Angler phishing - A phishing attack directed specifically at social media users . Whaling - A phishing attack targeted….
0
1
0
@Securityco73918
Security controller
25 days
Angler phishing - A phishing attack directed specifically at social media users . Whaling - A phishing attack targeted at senior executives . Tailgating - The attacker without access authorization closely follows an authorized person in a reserved area.
0
1
1
@Securityco73918
Security controller
1 month
Cyberattacks don’t crash systems. They crash reputations. #CyberSecurity.
0
0
0
@Securityco73918
Security controller
2 months
Phishing' is when criminals use scam emails, text messages or phone calls to trick their victims. The aim is often to make you visit a website, which may download a virus onto your computer, or steal bank details or other personal information.
0
0
0
@Securityco73918
Security controller
3 months
A watering hole attack is a form of cyberattack that targets groups of users by infecting websites that they commonly visit.
0
0
1
@Securityco73918
Security controller
3 months
Deterrence comes first. Once you have emplaced adequate security measures to deter threats or intruders, you have successfully taken care of external threats. #securityblogger .#deterrence.
0
0
0
@Securityco73918
Security controller
3 months
Watering Hole Attacks: . Cybercriminals target websites commonly visited by their intended victims, turning them into traps for unsuspecting . Be careful which websites you put your personal information on.
0
0
0
@Securityco73918
Security controller
4 months
RT @Securityco73918: Beware you can be a victim . Follow my page for more security information. There’s no irrelevant information https://….
0
1
0
@Securityco73918
Security controller
4 months
Beware you can be a victim . Follow my page for more security information. There’s no irrelevant information
Tweet media one
0
1
1
@Securityco73918
Security controller
4 months
Kuala Lumpur Airport Suffered Cyberattack – Hackers Demanded US$10 Million Ransom.By Kaaviya - March 28, 2025.
0
0
0
@Securityco73918
Security controller
4 months
Security refers to the measures and protocols implemented to protect assets from intentional or unintentional harm. These assets include:.• Physical Assets: Buildings, equipment, and inventory. • Human Assets: Employees, contractors, and visitors.
0
0
2
@Securityco73918
Security controller
5 months
A short quiz
Tweet media one
0
0
0
@Securityco73918
Security controller
5 months
Two people were arrested in New York City after allegedly using backend access to StubHub’s system to steal the URLs for 900 concert tickets, most of which were for Taylor Swift’s popular Eras Tour. - Record News.
0
0
1
@Securityco73918
Security controller
5 months
According to a report from the Ponemon institute, human error accounted for nearly 30% of worldwide data breaches. Human weakness is a major threat
Tweet media one
0
0
2
@Securityco73918
Security controller
5 months
A California man has been sentenced to 7 years for running a $50M scam using fake financial websites. Learn how the scheme operated.
0
0
0
@Securityco73918
Security controller
5 months
Phishing attack . Phishers will pretend to be trusted source like a hospital, band or employer. The phishing message will likely include alarming or suggestive language to fool victims into .1. Click on a link .2 open a document .3.install software
Tweet media one
0
0
2
@Securityco73918
Security controller
6 months
What is watering hole attack?. A watering hole attack is a security exploit in which the attacker seek to compromise a specific group of users by infecting websites that members of the group are known to visit. #cyberattacks
Tweet media one
0
0
1