article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. Erin: What are some of the most common social engineering tactics that cybercriminals use? How did you first get interested in cybersecurity as a career?

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Phishing and social engineering are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers. The three innovators and MIT patented the RSA algorithm, a proprietary system available through RSA Security until its public release in 2000.

article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Phishing and social engineering are common ways threat actors can obtain a symmetric key, but cryptanalysis and brute force attempts can also break symmetric key ciphers. The three innovators and MIT patented the RSA algorithm, a proprietary system available through RSA Security until its public release in 2000.