
What in the World is Sim Swapping?
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
It was early 2020 when, after a 6.4 earthquake, Puerto Rico’s Industrial Development Company Director Ruben Rivera received an email requesting a change to one
Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and
Beware! That email from your bank, credit card, or social security can be a door to nasty malware, system hijacking, or a data breach. Fraudulent
When it comes to passwords, small-to-medium-sized businesses and organizations should remember a few things to make them more secure. But passwords should not be the
(This is the second of two articles on personally identifiable information (PII).) Data privacy is not only a personal data issue. Not only is PII
(This is the first of two articles on personally identifiable information(PII).) Steve had just received his credit report and noticed a bank loan taken out
Larry had been working in the accounting department of a medium-sized business for about a year and now had to hold down the fort while
Many daily data and system breaches around the world result from stolen, weak or reused passwords. Users need a password for almost every site and
Creating strong, complex passwords requires using the right kinds of characters, numbers and symbols. You should adhere to these practices even if you aren’t required