The keys to your cyber kingdom are your passwords. All your money, your contacts, your calendar and the photos you won’t show your mom are protected by the power of your password. You know that. Bad guys know that. That is why bad guys want passwords. They use social engineering techniques to steal passwords. What is social engineering? How hard is it to manipulate people into divulging this crucial cyber security information? Jimmy Kimmel shows you at our new blog.
How was North Korea able to pull off a successful cyberattack against Sony? What was the secret exploited by the North Koreans?
Spearphishing. Learn more at our new blog.
SpiceWorks is reporting a phishing attack targeting Microsoft customers. Learn more at our new blog.