What is Public Key Infrastructure, PKI 1

What is Public Key Infrastructure, PKI

Introduction Public Key Infrastructure (PKI) is a system of digital certificates, cryptographic keys, and trusted third-party authorities that are used to secure electronic communications and transactions. PKI uses a combination of private and public key encryption to secure data and ensure that only authorized parties can access it. PKI also includes a system of...

Who is domain name registrar 7

Who is domain name registrar

Very often we received question from the public and from our own social media platforms regarding the question “Who is domain name registrar”. On this blog post, WebNIC Academy would like to describe attentively on Domain Name Registrar. Who is domain name registrar A domain name registrar is a company or organization that is...

Securing your Email with<br>Digital Trust 12

Securing your Email with
Digital Trust

Securing your Email with Digital Trust With phishing attacks now commonplace, corporate information security programs routinely train on how to avoid email compromise. However, the frequency of email attacks has dramatically accelerated over the last couple of years. In their most recent quarterly report, theAnti-Phishing Working Group reported the highest level of phishing activity...

The Dangers of Phishing Attacks and How to Prevent Them 33

The Dangers of Phishing Attacks and How to Prevent Them

Phishing attacks happen frequently and pose great dangers Phishing attacks have increased a lot in recent years and they happen very frequently. The reason behind this is because they are very effective and efficient for cybercriminals, but most importantly very profitable for them. Many users and organisations have fallen victim to phishing attacks, whereby...

Types of Phishing Attacks You Need to Know 38

Types of Phishing Attacks You Need to Know

What is a phishing attack and what does it mean? Phishing is a form of cyberattack that is aimed to trick users into giving away their sensitive information, such as credit card details, passwords, bank accounts and any personally identifiable information. It can also be used to deceive users to click a link, which...

Q2 2021 Top 10 Most Impersonated Brands in Domains 44

Q2 2021 Top 10 Most Impersonated Brands in Domains

What are the top 10 most impersonated brands in Q2 2021 in terms of spoof domains? Cybercriminals often use spoof domains to impersonate world-renowned brands to trick Internet users into giving their confidential information to them. In addition, they also use these spoof domains as attack vectors to perform cyberattacks, such as malware distribution,...