ALLURE SECURITY BLOG

Poisoning the Well: Deceive and Disrupt the Phishers

To shift the balance of power and finally gain an advantage over phishing ...
Read More

Déjà Vu All Over Again: Phishing Scheme Targets Presidential Candidates

The continued attempted hacks against computers used by the staff for ...
Read More

The economic impact of cybersecurity

As the world grapples with ...
Read More

Cloud File Sharing: Uncover Unknown Risk

The relentless move by enterprises to cloud storage comes at a price: a lack ...
Read More

Canary Tokens Versus Patented Decoy Documents

Detecting early-stage data theft activity can be the difference between ...
Read More

How the FBI Used A “Booby-Trapped” Document to Foil an Attacker

A recent story in Vice’s Motherboard section detailed how a cybercriminal, ...
Read More