Google at loggerheads over support for journalism

Google at loggerheads over support for journalism

Google and the state of California have come to loggerheads over legislation designed to require Google to provide financial support for local journalism. Naturally, Google is fighting this with a PR and lobbying blitz. They and their allies may be missing the point. Whatever the outcome, it could have a profound impact on the democratic process. The legislation, The California Journalism Preservation Act (CJPA) has been wending its way through…

a pile of gold bitcoins sitting on top of each other

Emerging Cryptocurrency Scams: Red Flags and Prevention

With the rise in popularity of cryptocurrencies, there has also been an alarming increase in cryptocurrency scams that target unsuspecting investors.

scam bucket explains digital fraud

Scam bucket: USPS Smishing

A relatively new “smishing” attack (using SMS texts to gather personal information) is moving through the US, with the attackers posing as the United States Postal Service (USPS). There are many variants but they all ask for personal information and,

woman in black shirt sitting beside black flat screen computer monitor

How Your Cybersecurity Strategy Can Combat Fake New

Fake news is a more significant threat to cybersecurity than most people realize, therefore it’s essential to be aware of how one can certify a news story’s validity online.

14-yr. old striker, Fola La Follette, and Rose Livingston

The Times they are A-changing: Women in Cyber

Today marks International Women in Cyber Day. Cyber Protection Magazine collected commentaries from women around the cybersecurity industry.

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Password, qwerty, 123456: Leaving bad habits behind on World Password Day

It’s World Password Day. If you’re still using weak passwords or one password for all your online services – read this article to hear what some experts say and what you need to change now.

scam bucket explains digital fraud

Scam Bucket: Bogus Emergency Data Requests

Hackers have a new way of stealing data: impersonating members of law enforcement agencies and making emergency data requests (EDR) for information.

Trending Topics: Phishing, Social Media and Malicious Email Attacks on the Rise

Newly published research gives new insights into the key cybersecurity challenges including the prevalence of social media attacks, phishing and malicious email attacks. It reveals how threat actors are shifting strategies as they look for ever more effective ways to mount attacks emphasising that organisations must remain vigilant.

IoT Security is Bad, but there is hope

We caught up with founder and CEO of Cyberus Labs, Jack Wolosewicz on his view on the future of security in IoT and 5G technology.

Mitigate Cyber Risks During the Ukraine War

Many experts believe cyberattacks against countries imposing sanctions against Russia are imminent. Organizations should be on high alert for the cyberattacks recently used in this conflict.

Lawsuit Pulls Back Curtain on Quantum Crypto Industry

The benefits of quantum computing are a bit hazy, but the danger of the technology is significant. Nation-states are pushing hard to develop quantum computers primarily to break the strongest encryption codes available. That makes governments, infrastructure organizations and corporate

Virtru adds security to period tracking apps

Period Tracking Apps Imperil Women

The recent US Supreme Court decision on abortion didn’t just set back women’s rights by half a century. It also restored the rhythm method of birth control, and imperils a women’s privacy rights. It is relatively difficult for women to

Optimism is a hard job. I love my job!

In honor of Women’s Equality around the world, we are thrilled to put a spotlight on the amazing story of Imevet Checol

Women’s Equality Day: A Day of Reflection for Women in Tech

Women’s Equality Day has become a marker for how far gender equality has come over the last century. We’ve asked industry expert to reflect on the past, present and future of women in cyber.

How a medieval city can explain cloud security.

There are two kinds of cloud security, and both can be explained using the analogy of a medieval city or village. Let’s do the time warp (again).