Can Your Mobile Phone Get Infected with Malware?
Can your mobile phone be infected with malware? It sure can. You’re holding a small computer in your hand, and it can be susceptible to malicious software just like your laptop or desktop. Nuisanceware can be problematic when it is downloaded with other applications. Spyware can lead to stolen data, and one step up is […]Learn More
What is a Deepfake?
A deepfake is a portmanteau (more on that in a moment) of “deep learning” and “fake”. What is a portmanteau? It is when you take multiple words and combine them into a new word. For example, smog is a portmanteau of smoke and fog. So how exactly could deepfake affect you and your business? If you take a photo, audio, or video and […]Learn More
What is a Botnet?
You may hear the word ‘bot’ used in conversations, especially around cybersecurity. But often we use it without really knowing exactly what it means or how it originated. The Players The term botnet is short for robot network. It describes a network of computers that are infected by malware. This malware is controlled by a single party, […]Learn More
Social Engineering in Action
Is social engineering that effective? Ask an Uber or Rockstar Games employee that question and you’ll likely hear a resounding yes. This effective mode of duping people within a targeted group or business was the method that one hacker used to hit both companies with a breach. Just how effective is it? In 2021, the FBI received 323,972 complaints of social engineering attacks. And […]Learn More
Ransomware Attack on Los Angeles Unified School District
The Los Angeles Unified School District (LAUSD) has confirmed that a criminal hacking group was able to access their systems and steal data. The attackers demanded that the school district pay an undisclosed amount to prevent the release of the stolen data to the public. However, the district refused the ransom demands, stating that “Paying […]Learn More
Student Loan Scams
Student Loan Scams With the launch of the U.S. Student Loan Forgiveness program, there is an opportunity for students and other borrowers to benefit. Any scenario that puts millions of people in a target pool is ideal for hackers. Add to the scenario the list of questions and uncertainties and you have a recipe for […]Learn More