One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
North Korea has a long history of hacking targets in the U.S.
Chris Price/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Elements of smart homes, including thermostats, may be vulnerable to hackers.
Ann Hermes/The Christian Science Monitor via Getty Images
Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
Do you want to be friends with this person?
Sasun Bughdaryan
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
For safety, look to text-only messaging.
The Conversation, via picascii.com, publicdomainpictures.net and kelvinsong
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Small outfits need cyberprotection too.
kirill_makarov via shutterstock.com
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Not this kind of spearfishing – the kind that involves a computer.
Underwater image via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Gah! What did I just do?!?!
Image of hands and computer via shutterstock.com