OSINT Defend Against SIM Swapping SIM swapping attacks are on the rise, learn more about them and how to protect yourself against them.
INFOSEC Featured Write Your Passwords in a Notebook and How To Memorialize and Access Deceased Loved Ones' Online Accounts These aren't easy things to think about but they are important. Here's everything you need to know in one place.
INFOSEC Squeeze Volume 4 - Retailers Are Easy Targets, Crime is Up 20% in the U.S., and Yet Another Reminder to UPDATE YOUR SCHWACK Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC Squeeze Volume 3 - $5M Bounty, Great Cannon DDoS, Linux CVE, a BeerCon in a pear tree Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC Squeeze Volume 2 - Twitter Hacker Arrested & New MFA, Google Hacking, New Kali Feature & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC Featured ♪♫♬ It’s Beginning to Look A Lot Like Riskmas ♪♫♬ Here's our friendly list of very basic DOs and DON'Ts each year to help protect you and yours this holiday season. Please - check it twice!
INFOSEC Squeeze Volume 1 - Disney+, Google $1.5M Reward & More Welcome to Squeeze, a curated selection of interesting infosec articles from the past week that you may have missed.
INFOSEC A Short History of Juice Jacking Learn about the history and origins of juice jacking, and what should be on your mind before you plug into an unknown USB port to charge your device.
TECHNICAL Featured A Definitive Guide To DMARC Learn about DMARC and how it can prevent fraudulent or spoofed emails being sent from your domain. Includes full DMARC setup instructions!
INFOSEC Chrome From A Security Perspective Google’s Chrome browser has become the most widely used browser on the market but is it a good fit your company and your security policies?
INFOSEC Better Privacy: Encrypting DNS Until companies design products and services with security in mind the work of protecting our privacy and security falls on consumers.
INFOSEC The Coordinated Inauthentic Behavior of TheBL network on Facebook Part two in Misinformation Researcher Sarah Thompson's series on coordinated inauthentic behavior on social media.
INFOSEC Coordinated Inauthentic Behavior A closer look at the 'coordinated inauthentic behavior' that bot networks engage in across social media.
INFOSEC Etag Tracking 101 An introduction to Entity Tags and how they are used to track internet users as they browse the internet.
INFOSEC Not Your Grandpa's Keyboard Why do so many of us waste our lives using keyboards with no personality?
INFOSEC Pentest Gone Bad: The Iowa Incident What happens when penetration testers get caught? To some people banning penetration tests seems like a good idea.
INFOSEC How to Write Cybersecurity Use Cases Learn how to write Use Cases in an engaging, immersive, and empathetic manner to generate sales leads and help build lasting relationships with buyers.
INFOSEC Chrome Extensions: The Dark Cloud Chrome extensions are leaking your data and the cloud is raining.
INFOSEC Mystical Mathematics & Snake Oil An opinion piece which takes a closer look at the TimeAI / Crown Sterling story.
INFOSEC Get Ready For BEER CON ONE #BC1 The closest infosec will ever get to a live telethon will be at BeerCon One when the Beer Farmers hold their podcast charity event.
INFOSEC GDPR Fines Have Reach & Bite Now that GDPR has been in effect for over a year, let's take a closer look at the fines imposed on those who failed to comply.
INFOSEC Write Like a Pro, Not Like a Bro Well-researched cybersecurity pieces that are easy to read and a joy to understand require a great deal of care and attention to create.
INFOSEC Journalists Need Infosec Skills They teach you a lot of different things at journalism school, but infosec skills don’t tend to be among them.
INFOSEC Stealing My Own Banking Information Infosec writer, Miguel Calles, highlights how well-meaning convenience features might result in information security leaks.