Read more about the article Text Messaging Attacks: A Smishing Saga
Distraught African American woman reading text message on mobile phone in a cafe.

Text Messaging Attacks: A Smishing Saga

Overview Mark was perplexed by the text message, a package delivery notification from Amazon - "Delivery attempt missed! Click the link now to reschedule or your package will be returned."…

Comments Off on Text Messaging Attacks: A Smishing Saga
Read more about the article Top Three Ways Cyber Attackers Target You
high angle view of hacker developing malware in dark room

Top Three Ways Cyber Attackers Target You

Overview Social engineering attacks, in which adversaries trick people into doing something they shouldn’t, are one of the most common methods that cyber attackers use to target people. The concept…

Comments Off on Top Three Ways Cyber Attackers Target You
Read more about the article Start A Career in Cybersecurity
Smiling caucasian female hr manager handshake hire male candidate at job interview

Start A Career in Cybersecurity

Overview As a result of a growing number of hacks on organizations and governments around the world, there is a huge demand for cybersecurity professionals to help defend against today's…

Comments Off on Start A Career in Cybersecurity
Read more about the article Messaging Do’s and Don’ts
Asian working woman texting text message on her smart phone, working in modern office.

Messaging Do’s and Don’ts

Overview Messaging serves as a primary mode of communication in both our personal and professional lives. However, quite often we can be our own worst enemy when it comes to…

Comments Off on Messaging Do’s and Don’ts
Read more about the article Identity Theft: Preventing, Detecting, and Responding
Cyber Hacker in Dark

Identity Theft: Preventing, Detecting, and Responding

Overview In today's digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and…

Comments Off on Identity Theft: Preventing, Detecting, and Responding
Read more about the article QR Codes
Qr code digital payment at coffee shop

QR Codes

Overview Have you ever wondered what those squares of dots or bars called "QR codes" are all about? You most likely have seen them posted on websites, printed on posters,…

Comments Off on QR Codes