Pig butchering: Proving the Luddites right

Pig butchering: Proving the Luddites right

Pig-butchering may be proving the Luddites were right. The social-engineering scam bypassed ransomware as the most profitable cybercrime approximately two years ago. After government regulations and law enforcement took a big bite out of returns for ransomware this past year, public-private partnerships are taking aim at the new champ. TL;DR * Pig butchering eclipses losses from ransomware * Top targets are tech savvy people under 50 * Human error trumps…

Getting serious about PQC

Getting serious about PQC

t seems like everyone should be concerned, based on the level of urgency the companies present, but in the end, no one has yet built…

How Breach and Attack Simulation (BAS) Enhances Robust Cybersecurity Practices

How Breach and Attack Simulation (BAS) Enhances Robust Cybersecurity Practices

Traditional methods of safeguarding information assets have become insufficient in today's world of advanced cybercrime strategies. A more proactive approach is needed. This article explains…

Solons scrambling to save AI

Solons scrambling to save AI

State legislatures are scrambling hard to enact regulations of the cybersecurity and AI industries to protect them from themselves. And the leaders of those industries…

Essential Tips for Securing Your Remote Workspace

Essential Tips for Securing Your Remote Workspace

More people than ever are working remotely. While this offers unprecedented levels of freedom and flexibility, however, it also comes with increased risks in the…

Opinion: Deprioritize social media for peace

Opinion: Deprioritize social media for peace

Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…

7 Most Dangerous Cybersecurity Threats

7 Most Dangerous Cybersecurity Threats

In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…

From Coders to Protectors: Women’s Influence in Cybersecurity

From Coders to Protectors: Women’s Influence in Cybersecurity

The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.

AI is at war with itself

AI is at war with itself

It almost seems that the AI market is an industry at war with itself.

Security issues, regulation, reality dull AI hype

Security issues, regulation, reality dull AI hype

In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gonemore

Sextortion is criminal, but may not be a crime

Sextortion is criminal, but may not be a crime

“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. It might not even be…

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Hollywood strikes fight over ownership of biometrics

Hollywood strikes fight over ownership of biometrics

Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…

How companies are helping customers take responsibility for security

How companies are helping customers take responsibility for security

The goal of these companies is to make the job of protecting user data easier for the user

Book Review: Data for All by John K. Thompson

Book Review: Data for All by John K. Thompson

Data for All by John K. Thompson

The Looming Identity Crisis

The Looming Identity Crisis

Rohit Ghai, CEO of RSA Security

Getting a handle on generative AI, before it gets a handle on us

Getting a handle on generative AI, before it gets a handle on us

No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…

What’s up with TikTok

What’s up with TikTok

TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…

Have we reached peak ransomware?

Have we reached peak ransomware?

Cybercrime reports flowing out of marketing departments still highlight the danger of ransomware. However, a closer look at the numbers reveals a much different story and poses the question: Have we reached peak ransomware? Last year, ransomware attacks hit all-time…

IAM in a shifting environment

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity…

A lesson on election security from tea ladies

A lesson on election security from tea ladies

Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…

Privacy Not Included Group dings Amazon this year

Privacy Not Included Group dings Amazon this year

That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…

Bolstering Workforce Security During Summer Holidays

Bolstering Workforce Security During Summer Holidays

While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore

Boosting digital hygiene without technology

Boosting digital hygiene without technology

When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…

Protection against DDoS attacks: do’s and don’ts

Protection against DDoS attacks: do’s and don’ts

The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…

Cheat Sheet: 3 Best Tips for Safer Internet Day

Cheat Sheet: 3 Best Tips for Safer Internet Day

Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…

Scam Bucket: Microsoft reveals year-old Franken-phish campaign

Scam Bucket: Microsoft reveals year-old Franken-phish campaign

Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…

How Zero Trust supports IT and OT security

How Zero Trust supports IT and OT security

The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production…

Scam Bucket: Phishing, Smishing: It’s mostly Facebook’s fault

Scam Bucket: Phishing, Smishing: It’s mostly Facebook’s fault

Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver…

Scam Bucket: Dusting your way to a breach

Scam Bucket: Dusting your way to a breach

elf-righteous, but they are imaginative in looking for new ways to rip you off. That's why we are launching this special series, Scam Bucket ,…

The Cybersecurity Cheat Sheet: Zero Trust

The Cybersecurity Cheat Sheet: Zero Trust

Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point…

Crossing the Compliance Chasm

Infosec.live looks at the Crowdstrike failure

Do corporations really care about your security?

Enhancing Security Operations Efficiency

Election security is not a technology problem. It is how naive we are

Elder fraud festers out of control

Info-sec.live Weekly News Show with Rohit Ghai

Mining data is daunting but crucial

Infosec.live news of the week

Crucial Tech: Madison Horn and the inflection point for Congress