Cybercriminals and nation-state actors capitalize on their past successes. They become progressively agile as they exploit current events and new technologies. Emergent Cyber Threats Concerns about cyber threats continue to mount. In December 2021, the United States...

‘Tis the Season for Holiday Scams
Busy and distracted online shoppers are prime targets for cyber scams. This season’s stressors include supply chain issues and shipping delays along with low stock and rising prices fueled by increased consumer demand. Predictably, cyber criminals will capitalize on...
The Rise of Synthetic Content and Deepfakes
What is Synthetic Content? The Federal Bureau of Investigation defines synthetic content as a broad spectrum of generated or manipulated digital content that includes images, video, audio, and text. In other words, it is content that has been automatically created....
Do smart devices mean smart security?
The IoT (Internet of Things) is a system of interrelated computing devices and objects that transfer data over a network without requiring human-to-human or human-to-computer interaction. The devices are connected to the internet that share data with other devices and...
Understanding the science behind Phishing attacks, and how to prevent them
Fight the Phish… and the Lizard Social engineering continues to be one of the most common cyber-attack strategies. Phishing, a form of social engineering attack, was the most common type of cybercrime in 2020, according to the Federal Bureau of Investigation. Scammers...
October is Cybersecurity Awareness Month
This year marks the 18th year of observing cybersecurity awareness month – and initiative co-led by the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA). The goal is to build awareness about the...
The Dangers of Data Scraping
What is data scraping? Data scraping is the process of extracting data from a website using automated tools and importing the information to another program/computer. This technique is used to collect vast amount of publicly available information and reuse it...
What are ransomware attacks
Ransomware is a form of malware that encrypts files on a device that compromises a system. Malicious actors rely on it for extorting money from individuals or organizations. Typically, hackers first deny access of files to users by encrypting the data. They hold...
Homograph Phishing Attacks: What you need to know
Social engineering continues to be one of the most common cyber-attack strategies. Cybercriminals are constantly evolving their tactics to phish for personal information or to get control of a device. One such tactic is called “homograph” or “homoglyph...
Rethinking Password Security
Passwords provide the first line of defense when a user wishes to gain access to a device or platform. It is the most used method of security. The stronger your password, the more protected your computer will be from hackers and malicious software. Creating Secure...