Guest Post – Evolution of Phishing: Spear Phishing and Whaling Scams Explained

Due to the high-profile cases of cybercrime in recent years, including the Facebook-Cambridge Analytica scandal back in 2018, the Equifax data breach in 2017, and the Russian interference with the US presidential election in 2016, cybersecurity is now a top priority for businesses, institutions, and individuals alike.

In order to implement effective countermeasures against cyber attacks, one has to have ...

Continue Reading →
0

The Internet Is Not Killing Newspapers – They are Killing Themselves

The newspaper industry has been blaming the Internet for its immanent and perhaps inevitable demise for decades.  Let’s forget the convenient facts like paywalls don’t work because I can get the information elsewhere for free.  Or that the subscription price of a newspaper I buy at the store or have delivered to my door covers the cost of physical delivery of the physical ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 2

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the last article and this article will ...

Continue Reading →
0

Guest Post – What Map Apps Track (and How to Get Them to Stop) – Part 1

A lot of very specific location information is being collected about you, me, and every other smartphone user.  The image at left shows everywhere I have been in the last four years, courtesy of Google location services.  If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help.  Today ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


The US is reportedly seeding Russia’s power grid with malware

The US is alleged to have been quietly planting malware throughout Russia’s energy networks in response to years of Russian attacks on its own power grid.

My comment:  Anybody who wonders why the bad guys are always attacking the US, well, it’s because we are doing it to ...

Continue Reading →
0

The Insider Threat – Part 2

The insider threat, the computer or network attack originating from inside our own network, is the hardest to defend.  In our last post we took a look at the disgruntled employee and the embezzler.  Today we will review insider-based sabotage and corporate espionage.

Sabotage – Sometimes a disgruntled employee will take out their frustrations by orchestrating a little sabotage.  Perhaps they have ...

Continue Reading →
0

The Insider Threat – Part 1

Which is a bigger risk to your organization?  A determined outsider trying to break into your network?  Or an insider, an employee or coworker who is already on the network as a credentialed user?  Obviously, it is the insider who represents the greatest threat.

In truth, all successful attacks become insider attacks.  The determined outsider who finds a way into your network is now ...

Continue Reading →
0
Page 1 of 71 12345...»