Kanika Sharma | AlienVault Blogs
Kanika Sharma

Kanika Sharma

Kanika Sharma works as a content curator at REVE Antivirus. For the past 3 years, she has been writing for various cyber technology blogs. Being an engineering graduate, her background allows her to connect with cutting edge technologies and relate them with real world scenarios. She likes to explore hills in her free time.

https://www.reveantivirus.com

June 25, 2018 | Kanika Sharma

Safety Measures for Protecting Your Business from Cyber Attacks

All sizes of businesses are now targets for cyber criminals. Per the Verizon 2018 DBIR, 58% of data breach victims are small businesses. Furthermore, it is shocking to see that 60% of small businesses are shut down within 6 months of an attack, according to the National Cyber Security Alliance. So, what makes these small enterprises prone to cyber-attacks? Probably it is the…

February 8, 2018 | Kanika Sharma

How Dangerous are Impersonation Attacks?

Amongst the types of cyber attacks happening, impersonation attacks are an interesting evolving category. Such attacks are generally targeted at corporate employees. The attack is executed by sending an email to the target in which the sender attempts to masquerade as a trusted source. This is done in order to gain access to target’s sensitive information, such…

Get the latest security news in your inbox.

Subscribe via Email

November 21, 2017 | Kanika Sharma

Keystroke Logging - How it Affects the Online Privacy of Internet Users

Besides being a useful tool to study human-computer interaction, keystroke logging or keylogging is one of the most dangerous cyber threats for online users. Designed to covertly log everything a user types using the keyboard, keyloggers can silently steal and pass on your sensitive information to cybercriminals. Not just the websites you browse or the queries you google on, but…

March 13, 2017 | Kanika Sharma

Cybercrime and Its Devastating Consequences: Ways to Beat Attackers!

Be it the online or physical world, criminals always take advantage of tools to execute their malicious attempts. The Internet in itself is the biggest tool of this trade that lets scammers and online attackers shield themselves behind a layer of anonymity while disrupting the rest of the world. Moreover, because of the lower risk and greater reward, there has…

Watch a Demo ›
GET PRICE FREE TRIAL