The mantra of cyber security experts is that you shouldn’t make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small … Read the story...
Category: Security
The most successful cyber attack method is triggered by victims themselves
The nasty thing with social engineering is that the victim falls for a scam, and ultimately helps cyber criminals to achieve their goal. Typically they want to break into a large computer system or simply access the victim’s bank account. … Read the story...
The problem with privacy: ideas and real life behavior don’t match
Scientists have researched for years the mismatch of results originating from interviews and surveys, and the actual behavior of people. Something tends to be wrong with the results, although respondents feel they have given accurate answers. This phenomenon is surprisingly … Read the story...
What small businesses and homes can learn from the Twitter whistleblower
One of the last big decisions Jack Dorsey made before handing over Twitter’s CEO responsibilities to Parag Agrawal was to hire a cybersecurity expert to fix the numerous security problems the company has. Peiter “Mudge” Zatko accepted Dorsey’s offer, and … Read the story...
Phishing is not rocket science: here are samples that draw clicks
Cyber security company Kaspersky has collected information on types of email messages that convince receivers to click dangerous links. The company has created a product that allows organizations to simulate attacks, phishing attempts and other threats. Simulation campaigns are targeted … Read the story...
Privacy paradox and five more data related megatrends
Collecting internet users’ data for trading it for profit is such a big business that it is not going to die anytime soon, even though people and governments across the world are getting increasingly worried about this shady practice. EU’s … Read the story...
The one and only cybersecurity rule for small businesses
If you haven’t been hacked yet, sooner or later you will be. This uncomfortable realization has been stuck in my head ever since I read Nicole Perlroth’s book This Is How They Tell Me the World Ends: The Cyberweapons Arms … Read the story...
Something is terribly wrong: 66% of organizations hit by ransomware in 2021
Ransomware attacks into organizations’ IT systems have been around in their current form for about 10 years, but it looks like the problem is still getting worse. Cybercriminals made a new record in successful ransomware attacks in 2021 when … Read the story...
Advertisers secretly collect email addresses from web page login forms
When you fill in a form or login to a web page, you probably expect that only the web service where you want to sign in gets your email address and password. Unfortunately, ad tech businesses that track people on … Read the story...
What, GDPR is a success? And everyone should install a private browser?
We have been clicking on cookie approval and rejection buttons for four years now. Unbelievable, but I’m getting used to it. Whereas many internet users regard the popup windows enforced by GDPR annoying, the result is that people have a … Read the story...