Why Phishing is Still a Thing – and How You Can Identify It
Are you able to identify a good phishing mail? Take a look at the anatomy of a phishing e-mail in our infographic!
Read more...Are you able to identify a good phishing mail? Take a look at the anatomy of a phishing e-mail in our infographic!
Read more...Government’s inability to protect citizen data resulted in at least $36 billion in cyber fraud this year. California may be getting ready to add to that total and setting up small businesses to be hit hard by hackers.
Read more...As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth it, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.
Read more...Something unusual for Christmas from Cybersecurity-Magazine: our first book review. “Het Virus” by Eddy Willems and Alain Dierckx.
Happy Holidays from Cybersecurity Magazine!
The security concerns of the 2020 election brought digital security to the forefront of the Western world’s attention and the buzz phrase “zero trust” went from tech company lip service to an actual technology feature. And for good reason. The biggest problem in digital security is not technological but human. People just didn’t want to make the effort to keep their data secure.
Read more...The Krebs incident in the USA and a discussion of encryption backdoors in the EU will make life for cybersecurity harder. A commentary.
Read more...