G2 Security Expert

Helping Tomorrow's Future

Menu
  • Privacy Policy
  • About Us
  • Small Business
  • For Your Home
  • G2 Threat Update

Category: Threat Reviews

SMS Phishing – A real world kill chain review

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

A few days ago, as I was heading out the door to a meeting, my phone dinged with a new SMS message. The message read: “Do not show anybody I sent that,” and included a link. It came from a number not saved in my contacts, so I decided to ignore it and revisit it […]

Read More »

Malicious Chrome Extensions – A Drive by Download

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Definition of a Drive By Download: Google: “A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”) a browser, app, or operating system that is out of date and has a security flaw.” Case Study: Late last week while traveling […]

Read More »

Why Anti-Virus is Not Enough for Your Endpoints!

No Comments
| G2 Threat Update, Small Business, Threat Reviews

Rather you purchased a new laptop from Best Buy or was issued one from your IT department the odds are it came with antivirus software.  Antivirus software is designed to detect and ultimately quarantine and remove viruses from machines. Antivirus software mitigates many forms of malware such as keyloggers, backdoor, trojan horses, and so on.  […]

Read More »

WiFi Access Points – What you need to know!

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

Is your office on a WiFi hotspot?  Do you connect to your local Starbucks, hotel, or at the gym?  Chances are you connect to WiFi to save from costly cellular data plans. Also, as more and more enterprises are enabling WiFi these access points are ripe for malfeasance.  Let’s look at a WiFi kill-chain to […]

Read More »

Top 6 Considerations for Identity Management

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Managing identities correctly will not only give your business a competitive advantage but it will also make you more secure. Rather you are managing employee, customer, or contractor identities you must take into consideration how you are going to not only use this information but also how to keep it secure.  If you don’t have […]

Read More »

Is Your Bluetooth Safe?

No Comments
| G2 Threat Update, Threat Reviews

Most of us turn on Bluetooth and just leave it on.  The fact is Bluetooth poses security challenges that need to be addressed. Bluetooth History and Background Bluetooth’s name came after King Herald and if you ever watched the movie “A Kingsman” then you’ll undoubtable remember the dinner scene when Gary ‘eggsy’ Unwin shows off […]

Read More »

Please follow & like us :)

LinkedIn
Twitter
Follow by Email
Facebook
Google+
https://www.g2expert.com/category/security-updates/threat-reviews">

Recent Post

  • SMS Phishing – A real world kill chain review
  • Malicious Chrome Extensions – A Drive by Download
  • Customer Identity Landscape is Evolving
  • Why Anti-Virus is Not Enough for Your Endpoints!
  • WiFi Access Points – What you need to know!

G2 Security Expert 2025 . Powered by WordPress