
What in the World is Sim Swapping?
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and
Beware! That email from your bank, credit card, or social security can be a door to nasty malware, system hijacking, or a data breach. Fraudulent
When it comes to passwords, small-to-medium-sized businesses and organizations should remember a few things to make them more secure. But passwords should not be the
(This is the first of two articles on personally identifiable information(PII).) Steve had just received his credit report and noticed a bank loan taken out
Larry had been working in the accounting department of a medium-sized business for about a year and now had to hold down the fort while
You need secure data. Whether you are using, saving or sending it, the bad guys want to steal (exfiltrate) it or encrypt it and hold
Edward ran up behind the company employee as he entered the building. “Can you hold the door, please?”“Sure!”“It’s my first day here.”“Well have a great
Andrew had just scaled his business with eight more employees and was optimistic about its potential. But he didn’t know that from the time he
An adversary or threat actor is the malicious person behind the machine: Nation-state hackers – as opposed to a hacker operating in a foreign country,