Bad Networking: What is a Botnet?

Author(s):

Patrick Putman, ,

Botnet Bot Herder

What is a Botnet? There are countless threats to computer security. Many of these threats are nothing more than good technologies used for bad reasons. One example of this is a botnet. Short for “Robot Network,” it is a group of connected computers controlled by software. This software is then used to perform a specific … Read more

Proving a Negative

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

KBA and Data Breaches

Proving there is a “you” has never been easier; proving you are the only you, not so much. We learned in math class in high school that you cannot prove a negative. Or to be more precise, we learned that you cannot solve a negative proof. As a result, in math and logic, we spend … Read more

Brand Protection is Essential for Cybersecurity

Author(s):

Karolina Kazlauskaite, Copywriter, Oxylabs

When we mention brand protection, we are referring to protecting your product, service, and brand image from plagiarism. Business owners invest time, effort, and money to brand and grow their company to then be victimized by cybercriminals who counterfeit their brand and their products. In turn, they steal a part of their revenue and, more often than … Read more

VPN vs Zero-Trust Network Access

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Virtual Private Networks (VPN) has provided remote workers with privacy while they are connected to a public connection for many years. While zero-trust is newer, it has proven to be quite effective. Especially in an age where remote work continues to increase, as does cyber-attacks. Noticeably, on VPNs. This begs the question, which is more … Read more

Overcoming Work-From-Home (WFH) Challenges are the Secret to Cybersecurity Success This Year

Author(s):

Stefan Maraj, Staff Writer, United States Cybersecurity Magazine

2020 was a mixed year as far as the cybersecurity community was concerned. On one hand, the raw figures are hard to argue with – a new Cloud Security Report 2021 from Wandera found 52% of organizations dealt with a malware incident in 2020, up from 37% in 2019. Cyber threats are growing across the … Read more

The Biggest 2020 Cybersecurity Threats

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

2020 trends, cybersecurity threats, 2020 building blocks, 2019 to 2020 change

Cybersecurity threats, as we discussed in our recent 2019 data breach article, were a huge problem in 2019. Within the first 6 months, Forbes reported that 2019 yielded 3,800 publicly disclosed breaches, a 52% increase from 2018’s first 6 months. 2019 saw data breaches in every sector, from financial and healthcare, to government and entertainment. … Read more

Safe Apps: How Can You Tell?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Safe App, Kids safety, kid on Ipad, cybersafe

StandHogg Hits Google Store According to Forbes, Google Android Threats continue to permeate through malware ridden apps that may affect many Android users. Researchers at the Norwegian app security company Promon claim that safe apps can be corrupted through dangerous vulnerabilities. In this particular case, the vulnerability, being dubbed “StrandHogg”, allows dangerous malware to pose … Read more

Emergency Actions After Hacking

Author(s):

Isabell Gaylord, ,

emergency sign in room with red chairs, emergency, hacking metaphor

Hacking has become ubiquitous on the internet. With even major companies like Evernote getting hacked, it’s not hard to imagine that you, an individual, could also get hacked. The experience is actually quite common, though that does not necessarily make it any less distressing. You are left feeling confused, with no idea what you should … Read more

OnePlus Reveals Second Data Breach in Two Years

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

OnePlus

Smartphone manufacturer OnePlus has been the victim of a data breach in which an unauthorized party gained access to customer’s order information. One Plus has released a statement revealing that customer names, contact numbers, emails, and shipping addresses might have been susceptible to theft. However, they have revealed that customer’s payment information, passwords, and accounts … Read more