Ransomware Scams

Ransomware is malware that tricks users into installing itself on their devices. Ransomware scams most commonly occur via email social engineering scams, a/k/a phishing scams. In ransomware attacks, malware encrypts a user’s files and requests ransom payment, often in bitcoin, to unlock the files and restore encrypted content to users. More →

Under Lock and Passphrase

When it comes to passwords for your various online accounts and services, a best practice is to use a unique password for each. After all, if passwords are shared between accounts and one is compromised, it creates a security risk for other accounts with the same password. It can also be very difficult to remember increasing numbers of strong passwords, many of which are required to contain special characters and capitalized letters. More →

Watering Hole Attacks

Information security discussions are plagued with bad analogies, and none sounds stranger than a “watering hole attack,” which plays off the tactic in which predatory animals stalk food by waiting at a popular watering hole. Rather than hunt their prey, the predator will wait for the prey to come to it. More →

Safe Travels: Mobile Device and Data Security on the Road

Checklists are often useful when planning for a trip. They can keep you from finding yourself at the airport counter without your passport or at a hotel with an incompatible cell phone charger. But while travelers are mostly worried about what physically goes into their luggage and carry-ons, most don’t give the proper attention to preparing their electronic devices for travel. More →