Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
We are deepening our understanding of why people fall victim to the attacks in the first place.