Phishing (pronounced exactly like “fishing”) is when a bad actor sends out some bait into the cyber world in hopes of convincing a victim to bite. Once the victim is “on the hook”, the bad actor does everything they can to reel them in and make a profit before disappearing. The bait often takes the form of some sort of
Tag: Advice
Advice on improving security postures.
There’s been a recent rise in smart locks being installed as replacements for the traditional pin-and-tumbler key locks. In some cases, the change is due to ease of use, the ability to share digital keys, and a way to provide limited access control. Whatever the reason, it’s important that you know some of the vulnerabilities inherent in these new smart
As more schools and businesses incorporate Internet of Things (IoT) devices into their facilities, they bring with them a host of new problems even as they solve others. One of the biggest dangers of all this new tech is in default passwords. Cybercriminals and other aspiring bad actors no longer need to find an administrative password to the one server
Air Tags can be a useful tool for many standard purposes, such as finding lost keys or tracking your luggage, but there’s a dark side to Air Tags and other Bluetooth-based tracking devices. These devices are being used more and more by stalkers and abusive partners to track their target’s whereabouts. These tags can be placed covertly in bags or