Related Posts
Cybersecurity Ethics: Establishing a Code for Your SOC
Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work. Being part of a... read more
BadUSB explained: How rogue USBs threaten your organization
The FBI has warned of an attack campaign that sends USB drives containing malicious software to employees. Here is... read more
Cyber security for lawyers
Over the past year alone, law firms have seen a steady increase in email scams, ransom attacks, and privacy... read more
Researchers: Wi-Fi Probe Requests Expose User Data
A group of academic researchers from the University of Hamburg in Germany has discovered that mobile devices leak identifying... read more
TODDLER: Credential theft overlays and accessibility event logging
In January of 2021, a new family of previously undetected banking malware was discovered. The samples were found on... read more
Intrusion Detection systems
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious... read more
Evil Twin Attack – A WiFi Cyber Security Threat You Should Know About
WiFi is everywhere nowadays. How do you know if the WiFi network you are on is safe and secure?... read more
Tough Economy Heightens Insider Threat
As companies downsize, they need to keep an eye out for disgruntled employees With a faltering economy resulting in increased... read more
Street-Level Surveillance
Cell-Site Simulators, IMSI Catchers, Dirtbox, Hellstorm,Fake Base Station are often used by intelligence and law enforcement agencies, however, legislation... read more
Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure
Over the weekend, the Alpharetta-based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information... read more
Leave a Reply