Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How to avoid malware on Android in one easy step

Jack Wallen offers up his best advice for avoiding malware on Android, and a list of apps that may be used safely.


Most Popular Websites in History

A really cool graphic courtesy of LinkedIn and Ben Theis of Skol Marketing. This one takes a while to unfold, so ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How to become a cybersecurity pro: A cheat sheet (free PDF)

As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs worldwide, ISC(2) found.


Watch Out for North Korean Malicious Cyber Activity

Original release ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


FBI Releases Article on Think Before You Post Campaign

Original release date: September 5, 2019

The Federal Bureau of Investigation (FBI) has released an article on their Think Before You Post campaign, designed to educate students on the use of social media and how to avoid making poor choices when posting, texting, or emailing thoughts or grievances ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Potential Hurricane Dorian Cyber Scams

Original release date: September 4, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should ...

Continue Reading →
0

Surveillance by Law Enforcement Reaches New Heights

Law enforcement agencies never stop complaining about how hard their jobs are. The crooks are using technology in criminal activities, and hiding themselves on the Internet using anonymizing proxies such as TOR, and VPNs.   And how it would be so much easier if they just could have a convenient “backdoor” to break encrypted messages.  The truth of the matter is ...

Continue Reading →
0

Don’t Get Emotional!

Social engineers have many tricks up their sleeves, and we have covered many of them in previous articles.  The biggest trick is phishing emails, of course, coupled with replica landing pages on hijacked websites.  Other methods include phone calls, such as fake tech support calls.  There are texting hoaxes, called smishing.  There are fake, cloned, or hijacked Facebook, LinkedIn, Twitter, and Instagram ...

Continue Reading →
0
Page 4 of 6 «...23456