article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

Cybercriminals are masters at using technology and psychology to exploit basic human trust and compromise businesses of all sizes. While cybersecurity advice is often focused on technology like endpoint protection, firewalls and anti-virus, it’s important to remember that behind every breach is a human.

Scams 107
article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. Cryptocurrency. There was no shortage of discussion surrounding cryptocurrency and its security flaws. In 2022, we expect to see an increased use of deepfake technology to influence political opinion. Ransomware. What to expect in 2022?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A on the Future of Work

Cisco Security

For example, recently I was speaking to the CEO of a big mining company who said he didn’t understand technology, and frankly, didn’t really care — but what he did care about was when we were going to get rid of all these passwords, because he is sick of them! As I think we all are!

article thumbnail

Spam and phishing in 2023

SecureList

Cryptocurrency scams Phishing aimed at stealing crypto wallet credentials remained a common money-making tool. Fake pages mimicking popular cryptocurrency sites invited users to sign in with their wallet credentials. Scam sites also used cryptocurrency as bait. The required amount is most likely unattainable.

Phishing 111