Remove Internet Remove IoT Remove Phishing Remove Social Engineering
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Network Security: Study network protocols, such as TCP/IP, and analyze common network attacks like DDoS, phishing, and man-in-the-middle attacks. Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals.

article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

The Internet of Things. IBM describes the internet of things (IoT) as the “the concept of connecting any device … to the Internet and to other connected devices.” Basically, the IoT encompasses anything from smart microwaves and fridges to self-driving cars and fitness devices (to name a few). Rosa Rowles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FBI warns of ransomware gang – What you need to know about the OnePercent group

CyberSecurity Insiders

This gang of cybercriminals targets individuals within an organization with social engineering tactics designed to fool them into opening a document from a ZIP file attached to an email. How do hackers use social engineering? OnePercent utilizes a malicious file attachment via phishing email. ” Conclusion.

article thumbnail

Cybersecurity threats: what awaits us in 2023?

SecureList

Phishing attacks are going to become even more sophisticated, since a lot of basic tactics have already been tried this year, and businesses learned to repel those. Internet ‘balkanization’, ongoing military conflicts, changes, and tensions in existing political groups of countries are influencing cyberspace and cybercrime.

article thumbnail

Securing the Supply Chain During Shipping Challenges

CyberSecurity Insiders

Verifying machine identities before enabling access can help secure Internet of Things (IoT) networks, which would otherwise expand supply chains’ attack surfaces. Distracted workers are particularly vulnerable to social engineering attacks, but thorough training can mitigate these risks.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

We’ve arrived at a critical juncture: to enable the full potential of the Internet of Everything, attack surface expansion must be slowed and ultimately reversed. Kapczynski Erin: Could you share your thoughts on the role of artificial intelligence, machine learning and the growth of IoT devices in both cyber defense and cyberattacks?

article thumbnail

The State of Endpoint Security Management in 2022: It’s Worse Than You Suspect

CyberSecurity Insiders

These can be mobile phones, workstations, desktop and laptop computers, tablet computers, smartphones, IoT devices, wearable smart devices, as well as virtual environments, among many others. Everyone who uses the internet or deals with a digital file or task uses an endpoint device.

IoT 120