Peaceful protests were interrupted by violence; smashing store windows, looting, and committing arson. Law enforcement sought to identify the looters, property destroyers, and arsonists using social media video and possibly other identity technologies such as tattoo recognition and facial recognition. This article examines privacy concerns as it relates to new technology.
Phishing attacks are something that everyone Internet user must be aware of. Phishing is social engineering that deceives users into doing something to compromise their computer, or identity, or network, or all three. Phishing emails entice users to click on malicious links or attachments, or enter credentials into a fake website. Spotting phishing attacks is a fundamental 21st century skill we all need.
Apple’s Mac Operating Systems (OS) is impenetrable to malware. MYTH. Recent malware analysis shows Macs are vulnerable to malware attack just like other operating systems. MalwareBytes reports a 400% increase in Mac OS malware from 2018 to 2019. Amazingly, this number of malware samples for the Mac OS was double the number found for Windows OS! Who knew?
Contact Tracing is used to slow the spread of COVID-19. This process identifies, or traces, the people potentially exposed to COVID-19 in the recent past by an infected individual. Used legitimately, it will help flatten the curve. What happens when hackers release malware laden immitation aps? Users get compromised and data is lost or stolen!
Cybrary Term of the Month
Disinformation is false or misleading information intentionally spread to deceive viewers and/or readers. Disinformation is propaganda which uses social engineering techniques to manipulate people into believing the information presented is factual. This propaganda has been used by Nation States to sway the thoughts of their citizens. Social engineering mixes just enough truth with a set of lies to make the propaganda seem plausible.
CyberHoot Comedy Corner
CyberHoot provides password-less access. Zero time wasted searching for websites, resetting passwords, and delayed login. Click an email link for instant training access!
Everything you need to learn cybersecurity skills is handled through email including training assignments, reminders, management compliance reports, and "My CyberHoot".
CyberHoot automates non-compliance through manager email notifications. Compliance status of employees for managers is enabled so you always know where you stand.
Cyber"Hoots" are most often 5 minutes or less. This ensures your staff get trained quickly with the most effective solution.
The Power of Open
CyberHoot is an open cybersecurity training Platform. Any video or PDF can be used to train and govern your employees.
In a survey of 100 CyberHoot users, 60% would be "Disappointed" or "Very Disappointed" if CyberHoot Training was stopped.