Latest stories

  • in

    Why Social Engineering is Still a Big Problem in 2021

    Trending Hot

    Social engineering is one of the most commonly used methods of stealing information from individuals and businesses alike. This is a form of cyberattack that is usually difficult for a user to recognize because it mostly relies on human interaction rather than computer code. The most important thing to remember about this method of attack […] More

  • in

    Top 3 Cyber Threats Of 2018

    Trending

    man-in-hood-jacket-hacking-a-laptop

    2018 saw the emergence of new malware, ransomware and other innovative ways of exploiting vulnerabilities in cyber systems. Here a few of the cyber threats that defined the year. VPNFilter VPNFilter is a malware program which is believed to have been developed by Fancy Bear APT Group. The malware has been hiding in a number […] More

  • in ,

    Cyber Crime and the Law

    Cyber Crime and the Law

    Strategic Cybersecurity, Module 10: Cyber Crime and the Law. This lecture expands on the difficulty in determining computer intrusion attribution by discussing the challenges of constructing laws to deal with such criminal activity. The Objective Once you have completed the readings, lecture, activity, and assessment, you will be able to Describe why cybercrime investigations are […] More