Pig-butchering may be proving the Luddites were right. The social-engineering scam bypassed ransomware as the most profitable cybercrime approximately two years ago. After government regulations and law enforcement took a big bite out of returns for ransomware this past year, public-private partnerships are taking aim at the new champ. TL;DR * Pig butchering eclipses losses from ransomware * Top targets are tech savvy people under 50 * Human error trumps…
t seems like everyone should be concerned, based on the level of urgency the companies present, but in the end, no one has yet built…
Traditional methods of safeguarding information assets have become insufficient in today's world of advanced cybercrime strategies. A more proactive approach is needed. This article explains…
State legislatures are scrambling hard to enact regulations of the cybersecurity and AI industries to protect them from themselves. And the leaders of those industries…
More people than ever are working remotely. While this offers unprecedented levels of freedom and flexibility, however, it also comes with increased risks in the…
Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…
In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…
The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.
In the last year the tech world has seen some spectacular expectation resets on “revolutionary” technology. Social media has gonemore
“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. It might not even be…
Read our archived Newsletters here.
Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…
The goal of these companies is to make the job of protecting user data easier for the user
No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…
TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…
Cybercrime reports flowing out of marketing departments still highlight the danger of ransomware. However, a closer look at the numbers reveals a much different story and poses the question: Have we reached peak ransomware? Last year, ransomware attacks hit all-time…
The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity…
Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…
That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore
When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…
The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…
Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…
Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…
The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production…
Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver…
elf-righteous, but they are imaginative in looking for new ways to rip you off. That's why we are launching this special series, Scam Bucket ,…
Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point…
There is a wide gap between regulatory compliance mandates and practical implementation and enforcement that I like to call the “Compliance Chasm”. That chasm is defined by the activity to protect consumers and consideration for the economic and operational impact on business enterprises. Finding that balance requires thought, not the…
The Crowdstrike failure dominated the news this week and the debate is whether it is Crowdstrike’s or Miicrosoft’s fault. It...more
“Your security is important to us,” is a common phrase on corporate websites and emails, usually after some data breach that affects customers. To prove that statement, corporations invest billions of dollars in the cybersecurity industry. Most market projections say the industry is worth about $180 billion. About 15 percent…
Today businesses face increasingly sophisticated cyber threats that necessitate robust security measures. One such innovative approach gaining traction is the Security Operations Center as a Service (SOCaaS). This model offers organizations the opportunity to enhance their security operations efficiently and effectively by leveraging external expertise and advanced technologies.
When it comes to election security, the technology we use to vote and count those votes is not the problem. The problem is how naive we are. Election security has been at the forefront of daily news cycles for more a decade. The concerns about illicit use of technology to…
As legislatures around the world try to get a handle on the growth of ransomware, another category of cybercrime is festering out of control: Elder fraud. The FBI’s Internet Crime Complaint Center (IC3) reported more than 100,000 people in the US, 60 years and older, lost $3.4 billion total to…
Identity security is one of the most significant issues facing individuals and businesses. Phishing and identity theft dwarfs ransomware in...more
The cybersecurity industry seems addicted to research but isn’t all that good at it. Mining the massive amount of data produced is daunting but crucial to everyone. Surveys and studies are an important part of marketing form the cybersecurity industry. Cyber Protection magazine receives a lot of them. We read…
Our chief editor Lou Covey participated in the Cyber News Show for Infosec.live today with host Simon Linstead giving an...more
We are at an inflection point in the US Congress. For decades technology companies have been given free rein to advance and innovate without concern for the negative impact of what they produce. That honeymoon seems to be over, but their lobbying power has kept the weight of regulation relatively…