Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How to become a cybersecurity pro: A cheat sheet (free PDF)

As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs worldwide, ISC(2) found.


Watch Out for North Korean Malicious Cyber Activity

Original release date: ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FBI Releases Article on Think Before You Post Campaign

Original release date: September 5, 2019

The Federal Bureau of Investigation (FBI) has released an article on their Think Before You Post campaign, designed to educate students on the use of social media and how to avoid making poor choices when posting, texting, or emailing thoughts or grievances that ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Dorian Cyber Scams

Original release date: September 4, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise ...

Continue Reading →
0

Surveillance by Law Enforcement Reaches New Heights

Law enforcement agencies never stop complaining about how hard their jobs are. The crooks are using technology in criminal activities, and hiding themselves on the Internet using anonymizing proxies such as TOR, and VPNs.   And how it would be so much easier if they just could have a convenient “backdoor” to break encrypted messages.  The truth of the matter is that ...

Continue Reading →
0

Don’t Get Emotional!

Social engineers have many tricks up their sleeves, and we have covered many of them in previous articles.  The biggest trick is phishing emails, of course, coupled with replica landing pages on hijacked websites.  Other methods include phone calls, such as fake tech support calls.  There are texting hoaxes, called smishing.  There are fake, cloned, or hijacked Facebook, LinkedIn, Twitter, and Instagram account ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Cyber war meets real war.

Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First

And from Bruce Schneier and Wired.


Microsoft Releases Security Updates to Address Remote Code Execution Vulnerability

Original release date: May 16, 2019

Microsoft has released security ...

Continue Reading →
0

Phishing – Not Just For Email Anymore

You know those surveys, games, and “like and copy” messages that your Facebook “friends” share with you?  Would you be surprised to learn that many of these “fun with friends”  activities are just cover for a new form of phishing exploit?  In the last few years phishing attacks have evolved from a primarily email-based attack into attacks using other vectors including surveys, games, gifts and prizes, and social networks.

Continue Reading →

0
Page 1 of 2 12