8 Different Types of Malware

Author(s):

Julia Sowells, ,

Malware fishing hook grabbing password out of envelope.

To combat malware, it’s important that you get your malware classifications right. These are the different types of malware and explaining how to recognize them: 1. Virus We tend to refer to all malware as viruses, but it’s not so. A virus modifies other legitimate host files in such a way that when you execute … Read more

Public WiFi: What is the Risk?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

WiFi is a lot like water. It is available almost everywhere and probably should be free. Unfortunately, a lot of times it is not safe to drink free water. Water that is sourced from a stream might be dirty, and unless you have a water purification system, it is not a good idea to drink … Read more

How to Keep your PC From Getting a Virus

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A magnifying glass lays over a PC screen as blue spiked viruses float out of the PC screen.

Stop Replacing your PC Once Every Three Years. It is no secret that PC has a bad reputation. In addition to being viewed as the model that is more likely to receive a virus, PCs are seemingly built to break. According to most companies, when your computer slows down, or behaves unusually, it is simply time … Read more

Child Internet Safety

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Woman assisting young girl who is typing on a computer in a library child internet safety

As a 23 year old, I belong to the very last age group of people who remember a world before internet connection became ubiquitous. My internet connection was dial up. Once I was old enough to start browsing the web, my parents sprung into action. They installed intense internet safety child blocks all over the … Read more

How to use Tor Safely

Author(s):

Julia Sowells, ,

Welcome to Tor Browser tab is open

Browsing Anonymously  Tor, as many internet users may know, is a free software that helps establish anonymous communication between computers. The name originates as an acronym for the software project ‘The Onion Router’. ‘The Onion Router’ helps users conceal their location and usage and protects them from people conducting traffic analysis or network surveillance. This … Read more

Learning Cyber Hygiene through Esoteric Cosmology

Author(s):

Sam Mercaldo, ,

Hands washing in the sink cyber hygiene

Learning Cyber Hygiene Through the Esoteric Cosmology of the Onmyōji The onmyōji of ancient Japan were practitioners of magic. The onmyōji were a part of the Imperial bureaucracy in Japan. According to records, they defended the empire against malicious spirits and unseen attacks. Modern cyber warriors who fight in cyber space bear much similarity with the … Read more

Blockchain, Public Ledger, and Peer to Peer Sharing

Author(s):

Sam Mercaldo, ,

blockchain public ledger binary coding

Blockchain has the potential to help your small business compete with much larger chains. At first, this technology may sound new and unproven. As a business owner, you may be unwilling to commit your limited budget into something so experimental. But you may be forgoing the best opportunity you will ever have to save money … Read more

Employee Reporting

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Employee Reporting boss yelling at employee business attire

As we have talked about before, insider threats are responsible for around 43% of all data breaches. Among these breaches, 21% of them are intentional, malicious, and premeditated. As more small businesses come under attack, anxiety within the work place is at an all-time high. When facing the threat landscape, it is important to remember … Read more

Common Cybersecurity Attacks

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity attacks, black and white, criminal typing on keyboard, cyber attack

In the cybersecurity world, vulnerability is the first step in exploitation. These exploitations often involve a hacker gaining unlawful access into a computer system and wreaking havoc. In order to stay vigilant and cyber safe, it is important to understand what the common cybersecurity attacks are. Backdoor Attacks A backdoor in a computer system is … Read more