Phishing (pronounced exactly like “fishing”) is when a bad actor sends out some bait into the cyber world in hopes of convincing a victim to bite. Once the victim is “on the hook”, the bad actor does everything they can to reel them in and make a profit before disappearing. The bait often takes the form of some sort of
Tag: Threats
Information about specific security threats
As more schools and businesses incorporate Internet of Things (IoT) devices into their facilities, they bring with them a host of new problems even as they solve others. One of the biggest dangers of all this new tech is in default passwords. Cybercriminals and other aspiring bad actors no longer need to find an administrative password to the one server
Air Tags can be a useful tool for many standard purposes, such as finding lost keys or tracking your luggage, but there’s a dark side to Air Tags and other Bluetooth-based tracking devices. These devices are being used more and more by stalkers and abusive partners to track their target’s whereabouts. These tags can be placed covertly in bags or