Are Viruses, Worms, and Malware The Same Thing?

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Viruses, Worms, Malware

Viruses, worms, and malware have somewhat become a buzzword, causally tossed around in conversations related to cybersecurity. However, since these terms are often associated with significant security issues and data breaches, it is crucial to gain better insight into what each of these terms means.  Are Viruses, Worms, and Malware The Same Thing? In common … Read more

Don’t Take the Bait! Signs You’re Just a Step Away from a Phishing Scam

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Phishing Scams

Phishing is one of the most significant threats in the modern cyber threat landscape. While this threat has been around for a considerable time, it continues to wreak havoc. In 2022 alone, there were more than 500 million phishing scams reported. As part of social engineering tactics, phishing attacks happen in various ways, amongst which … Read more

Other People’s Data Breaches: They Can Help You Too

Author(s):

Alex Haynes, CISO , IBS Software

Data Breaches

Over the past few years, numerous well-known brands and major corporations have been targeted by cyber-attacks resulting in the exposure of millions of customers’ personal and sensitive information, making data breaches an increasingly common occurrence. Although the immediate effects of these breaches can be severe for both affected individuals and companies, there is potential for … Read more

How Cryptocurrency Impacts Cybersecurity

Author(s):

Simonas Kičas, Marketing Manager, Acceleron Media

Cryptocurrency Cybersecurity

22% of surveyed companies in the United States lost between $100,000 and $499,000 to cyber-attacks in 2022. That is only one segment, as 4% lost over a million dollars to cybercrime. So, how do cryptocurrencies fit into this menace? The crypto world today is so different than it was, say, a decade ago. People have … Read more

Telegram: A Thriving Hub of Criminal Activity

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Telegram

Secure messaging platforms have long since been in the middle of ethical debates, primarily over their use. They indeed allow users a chance to attain the online security they deserve and help protect personal information from data snoopers. In contrast, it is also true that these platforms can become the hub of cybercriminal activity due … Read more

What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

What is credential-stuffing

Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and steal your personal information.  Credential-stuffing is a form of automated attack that involves hackers using stolen usernames and passwords to gain access to user accounts.  By leveraging large collections of stolen credentials, hackers can quickly … Read more

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Use VINs to Hack Cars

During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the internet. These thieves have become more intelligent and can go past computers and cell phones by taking advantage of people’s cars through the Vehicle Identification Number (VIN). So, how are these cybercriminals using VINs to … Read more

4 Food and Beverage Cybersecurity Challenges: How to Overcome Them

Author(s):

Brian Deken, NA Commercial Manager, Rockwell Automation

Food and Beverage Cybersecurity Challenges

The June 2021 ransomware attack on JBS Foods that knocked out the plant operations supplying roughly a fifth of the United States’ meat supply and created shortages across the country proved not only that no industry is immune to cyber-attack, but also that consumer packaged goods, food and beverage manufacturing is a critical industry. In … Read more

Cyber Whistleblowing: What Employers Should Know

Author(s):

Frankie Wallace, ,

Cyber Whistleblowing

As businesses adopt emerging technologies like AI and VR, professional lives are growing more connected to the internet and, therefore, the world. While this can drastically improve efficiency and contribute to business growth, it has also led to a rise in cyber-attacks — and not just for tech companies. Cybercrime is affecting industries beyond tech, … Read more