Skip to content
    Cybersafe

    Cybersafe

    Category: Cybersecurity

    Cybersecurity

    What to Do with Default Apps

    February 28, 2023February 21, 2023 Alex

    Fresh out of the box, your phone probably had the provider’s preferred web browser; an application to Map your way around; somewhere to send messages and even backup data! What do you do with all these default programs?

    Read More
    Cybersecurity

    Phishing Scams Compromise Reddit

    February 24, 2023February 23, 2023 Alex

    In early February, a Reddit employee fell for a phishing scam. That led to a data breach exposed the administrators’ side of Reddit’s database.

    Read More
    Cybersecurity

    Breach on GoDaddy Goes Back “Multiple Years”

    February 21, 2023February 22, 2023 Alex

    Recently, an investigation into suspicious activity on GoDaddy servers uncovered a massive data breach that’s been ongoing since at least 2020.

    Read More
    Cybersecurity

    Data Breach Exposes 1M CHS Patients’ PHI

    February 17, 2023February 15, 2023 Alex

    Recently, Community Health Systems experienced a data breach that affected the private information of one million patients.

    This is the latest in a string of supply chain attacks targeting businesses.

    Read More
    Cybersecurity

    How to Manage Third-Party Risks

    February 14, 2023January 30, 2023 Alex

    With the increased use of SaaS and other services, it is essential to understand the risks associated with third-parties and how to best manage them. This is the best way to prevent malicious actors or accidental data loss.

    Read More
    Cybersecurity

    Roaming Mantis: Real-Time Case Study in Compromised Public WiFi

    February 10, 2023January 30, 2023 Alex

    The Wroba.o malware was already discovered in France, the U.S. and Japan in just the last quarter of 2022.

    Read More
    Cybersecurity

    Google Fi-ghting a SIM Swap Attack

    February 7, 2023March 4, 2023 Alex

    Many companies use third-party services to perform routine operations, including customer support. That naturally opens up a crack for hackers to slither in and try to drill into big databases like Google’s.

    In this case, that’s exactly what happened.

    Read More
    Cybersecurity

    Inside the Breach on T-Mobile

    February 3, 2023January 30, 2023 Alex

    The 37M users whose data was stolen included their name, addresses, email addresses, phone numbers, birthdays and even T-mobile account information.

    Read More
    Cybersecurity

    How Encryption Really Works: A Beginner’s Guide

    January 31, 2023January 26, 2023 Alex

    If you’re new to encryption, this article will teach you everything from common terms and definitions, to how encryption works in practice.

    Read More
    Cybersecurity

    What You Need to Know About Physically Securing Your Devices

    January 27, 2023January 23, 2023 Alex

    5 tips to better the physical security of all your devices.

    Read More

    Posts pagination

    Previous 1 … 30 31 32 … 46 Next

    Recent Articles

    • How to Recognize and Beat AI Bias
    • The Most Common Ways Workers Accidentally Put Data at Risk
    • The Hidden Dangers of Outdated Systems
    • Why Hackers Go After Universities And What It Means for Your Data
    • What Is “Read-Only” Access and Why Does It Matter?
    All Rights Reserved 2025.
    Proudly powered by WordPress | Theme: Fairy by Candid Themes.