Met Your Valentine Online? Have a Cyber-Safe Date!
Introduction Have you ever downloaded a dating app? Slid into someone’s DMs on social media? Made a dating profile on a website like eHarmony? Romance schemes affect over 70,000 people […]
Double Clickjacking, Toil and Trouble!
Introduction You may have heard about clickjacking before…but what about DOUBLE clickjacking? The same threat has evolved into a newer, more malicious form. In a regular clickjacking attack, you’re tricked […]
New Ransomware Targets Amazon AWS
Introduction Do you use Amazon Cloud Storage? Amazon S3? If these names sound familiar, then you know about Amazon Web Services. What you might not know their cloud services are […]
U.S. Executive Order On A.I., the Environment, and Cybersecurity
Introduction Less than a week before the next U.S. presidential inauguration, President Biden signed an executive order. The new law aims to grow A.I. in the United States. Biden intends […]
Is There A Hacker In Your Smartphone?
Introduction Do you have a smartphone on you right now? If you’re like 4.88B others, then you absolutely do! In fact, because so many people have multiple devices (for instance, […]
Are Your Social Media Profiles Secure?
Introduction When you join a new social media platform or create a new account, what’s the first thing you do? Hopefully, the answer is: Turn on specific security settings for […]
Is It a Crock to Call Crypto Cash?
Introduction Did you hear? A Washington couple is suing Safeco Insurance Co. for refusing to cover $600,000 worth of cryptocurrency stolen by hackers. Wait…if hackers exploited their crypto-wallet, how is […]
State of the U.S. “TikTok Ban”
Introduction How much do you know about the so-called “TikTok ban” rumored to happen in America soon? The federal Supreme Court in the midst of deliberating a national ban on […]
Job Seekers and Recruiters: Protect Yourself from Cybercrime
Introduction Millions of people around the world are on the hunt for a new job right now. Whether it’s a complete career change or a new position in their same […]
How AI Will Impact Cybersecurity in 2025
Introduction As we move into 2025, the landscape of cybersecurity is undergoing significant transformations, driven largely by advancements in artificial intelligence (AI). Both malicious actors and defenders are leveraging AI […]
Why Is Email Such a Common Method of Cyber-Attack?
Introduction Did you know? 94% of all malware is delivered via email. Why is that? What makes email platforms such a popular vector for malware distribution? Let’s find out together! […]
Best Practices to Protect PHI — and Why Everyone Should Know How
Introduction Cybersecurity isn’t just a technical checklist—it’s a critical business strategy that protects what matters most: Your personal and professional digital assets! When it comes to your personal healthcare information, […]
