413 posts
What is a nearest neighbor attack?
Hackers aim to exploit any possible loopholes to attack an organization of interest. And sometimes, the loopholes do not have to be in the targeted…
Black Friday season has begun, so the scams
Black Friday is no longer just the day after Thanksgiving; over the last decade, it has morphed into a Black Friday season, with people worldwide…
How to spot a deepfake love scam?
Hong Kong police recently busted a gang that managed to steal tens of millions of dollars from middle-aged men looking for love. We are referring…
British Students Warned of Smishing Scams
British students are being warned to be vigilant about a rise in smishing scams. The body that provides undergraduate funding, The Student Loans Company, has…
Federal agency confirms that a health data breach affects a third of Americans
Early this year, hackers managed to steal approximately 6TB of data from UnitedHealth. After months of investigation, Health and Human Services (HHS) revealed that about…
Worms vs. Viruses: What’s the Difference?
Worms and viruses are both types of malware. Worms are more self-sufficient and spread independently through networks, while viruses need human help and a host…
What is the difference between a data leak and a data breach?
You have no doubt heard of ‘data breaches’ and ‘data leaks’ – but did you know they are slightly different things? In this article we’ll…