-
Understanding the TAKE IT DOWN Act: What It Means for Digital Safety and Cyber Awareness
Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance digital safety and protect personal privacy. Go to Source
-
Enhanced Phishing Training: Dealing with Today’s Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device to the office network, right? Go to Source
-
Essential Best Practices for Cyber Awareness Training
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” – Captain Jack Sparrow Go to Source
-
Your Digital Footprint: How AI Tracks and Uses Your Online Activity
Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem harmless to browse your favorite websites or interact on social media, artificial intelligence (AI) algorithms are monitoring and analyzing every digital action. These algorithms can build detailed profiles based on your…
-
Understanding Credential Stuffing
Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right? Go to Source
-
Friday Squid Blogging: Anniversary Post
I made my first squid post nineteen years ago this week. Between then and now, I posted something about squid every week (with maybe only a few exceptions). There is a lot out there about squid, even more if you count the other meanings of the word. Blog moderation policy. I made my first squid…
-
Salt Typhoon’s Reach Continues to Grow
The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon. The US government has identified a ninth telecom that was successfully hacked by Salt Typhoon. Go to Source
-
Gift Card Fraud
It’s becoming an organized crime tactic: Card draining is when criminals remove gift cards from a store display, open them in a separate location, and either record the card numbers and PINs or replace them with a new barcode. The crooks then repair the packaging, return to a store and place the cards back on…
-
Scams Based on Fake Google Emails
Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post. Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post. Go to Source
-
Friday Squid Blogging: Squid on Pizza
Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken and calamari studded throughout the middle.” Blog moderation policy. Pizza Hut in Taiwan has a history of weird pizzas, including a “2022 scalloped pizza with Oreos around the edge, and deep-fried chicken…