Email: The Ultimate Phishing Hole

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hole in the ice, fishing line in the hole, boots to the side, email phishing abstract

Recently, we talked about the importance of questioning everything when it comes to cybersecurity; telephone calls, websites, text messages, snaps, any of these mediums are a forum for viruses. As the threats continue to change and grow, many people have started to become more aware of how widespread phishing has become. Phishing has grown in popularity, … Read more

Top 10 Useful Network Vulnerability Scanning Tools

Author(s):

Julia Sowells, ,

Vulnerability Scanning, man typing, connected globe

Network security is very important in today’s world. Network scanning, or rather network vulnerability scanning, has a crucial role to play in regards to the overall security of any enterprise and the data that it handles. Here is a look at the top 10 useful network vulnerability scanning tools available today. HackerCombat Network Security Scanner … Read more

Threat Intelligence: How It Can Help Tackle Malware, Phishing and Hacking

Author(s):

Jonathan Zhang, ,

Man walking down red hallway with icons, threat intelligence abstract

Cyber attacks happen all the time and in multiple forms, causing tremendous harm — e.g., broken trust, financial loss, reputation damage, and intellectual property theft. So preventing and stopping threats surely sounds like a priority, right? The tricky part is that there is not just a one-size-fits-all approach to achieve that. Each organization is unique … Read more

Hacking Through History: Three People Who Hacked Without Computers

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hand clicking on Morse Code, Cybersecurity History, Early Hacking

People usually attribute the history of cybersecurity to the Creeper. The Creeper was an infamous program that acted as the first virus in history. This 1971 virus was distributed to mainframe computers and possessed to ability to move around. The program was not malicious in anyway. The Creeper did no damage.  It simply would display … Read more

Cybersecurity Career

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Lit Two Men Cybersecurity Career Engineer Lab

Cybersecurity is a growing threat. Last year, we saw 143 million Americans lost their personal, sensitive information in an Equifax data breach. This year, we saw Facebook allow our personal information to be mined by third party company without our consent or knowledge. In the year of 2016, the US. Bureau of Labor Statistics (BLS) claimed that … Read more

Why People are Ditching Social Media

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hand unplugging, unplug, social media detox

The Pew Research Center has released a new report that tracks the relationship people have currently with social media. It has been six months since Facebook revealed that they were allowing user’s information to be harvested by Cambridge Analytica. According to the report released by Pew Research Center, the debacle has turned a lot of … Read more