One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.