Understanding IoMT Security

Author(s):

Miles Oliver, Author,

IoMT Security

The advent of the Internet of Medical Things (IoMT) is truly revolutionizing patient care, promising to alleviate much of the burden on an already struggling healthcare system. For all the breathtaking potential of the IoMT, however, there are equally significant risks. More specifically, IoMT security is a deep and growing concern both as technologies proliferate … Read more

How to Create a Cybersecurity Plan for Your Small Business

Author(s):

Tanmay Luniya, SEO Executive, Youths Era

cybersecurity plan

As a small business owner, it’s essential to protect your company’s data and systems from cyber threats. With the increasing reliance on technology and the internet for communication and conducting business, it’s more important than ever to have a solid cybersecurity plan in place. Below are six steps you can follow to create a cybersecurity … Read more

How Cryptocurrency Impacts Cybersecurity

Author(s):

Simonas Kičas, Marketing Manager, Acceleron Media

Cryptocurrency Cybersecurity

22% of surveyed companies in the United States lost between $100,000 and $499,000 to cyber-attacks in 2022. That is only one segment, as 4% lost over a million dollars to cybercrime. So, how do cryptocurrencies fit into this menace? The crypto world today is so different than it was, say, a decade ago. People have … Read more

How to Protect Employees Against 5 New Cybersecurity Threats

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Rising Threats

Cybersecurity is a continually changing field. As businesses resolve old vulnerabilities, attackers develop new strategies that work around them. Defenses must repeatedly evolve to remain secure. If employers want to keep their employees safe, they must stay on top of emerging cybercrime trends. Some threats, like social engineering, aren’t new but are experiencing significant growth. … Read more

Telegram: A Thriving Hub of Criminal Activity

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Telegram

Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information from data snoopers. In contrast, it is also true that these platforms can become the hub of cybercriminal activity due … Read more

What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

What is credential-stuffing

Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and steal your personal information.  Credential-stuffing is a form of automated attack that involves hackers using stolen usernames and passwords to gain access to user accounts.  By leveraging large collections of stolen credentials, hackers can quickly … Read more

Blockchain Smart Contracts and Supply Chain Security

Author(s):

Miles Oliver, Author,

Blockchain Smart Contracts

With the ignominious demise of FTX in recent months, cryptocurrency has been much in the news of late for all the wrong reasons. The reality, however, is that blockchain technologies, through which the various cryptocurrencies operate, offer significant promise in spurring efficiency and security across industries. This is particularly true of the supply chain. In … Read more

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Use VINs to Hack Cars

During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the internet. These thieves have become more intelligent and can go past computers and cell phones by taking advantage of people’s cars through the Vehicle Identification Number (VIN). So, how are these cybercriminals using VINs to … Read more

Revelations From CISA Proves Phishing is a Public Menace

Author(s):

Stu Sjouwerman, Founder and CEO, KnowBe4

Phishing Attacks

A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on the planet. Phishing attacks are growing in volume and sophistication. An estimated 255 million phishing attacks were observed in 2022, a 61% increase over 2021. There’s also a steep increase in spear-phishing attacks, smishing attacks, … Read more