SocialEngineering
Healthcare: Elite Data
Karen Bender | | #BeCyberSmart, Connected Devices, Cybersecurity, General, healthcare, healthdata, ncsam, Protect Yourself, SE, SocialEngineering
The healthcare industry is overwhelmingly reliant on internet-connected devices as solutions. There’s no doubt some of those devices advance patient care and even critical response. Healthcare possesses elite data making ...
#BeCyberSmart: Protect Your Cyberspace
SEORG | | #BeCyberSmart, cisa, cyberspace, ncsam, Newsletter, Phishing, Ransomware, SocialEngineering, virtual classroom, virtual workspace, vishing
In This Issue, "#BeCyberSmart: Protect Your Cyberspace". Whether it’s protecting your personal network and devices, your virtual workspace, or classroom, find out how you can #BeCyberSmart. The post #BeCyberSmart: Protect Your Cyberspace ...
Artificial Personas and Public Discourse
Bruce Schneier | | algorithms, artificialintelligence, botnets, deepfake, disinformation, essays, propaganda, SocialEngineering, socialmedia, voting
Presidential campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping politics. One of the biggest threats on ...
Hacking Instagram to Get Free Meals in Exchange for Positive Reviews
This is a fascinating hack: In today's digital age, a large Instagram audience is considered a valuable currency. I had also heard through the grapevine that I could monetize a large following ...
Attacking Soldiers on Social Media
A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power ...
Sophisticated Voice Phishing Scams
Brian Krebs is reporting on some new and sophisticated phishing scams over the telephone. I second his advice: "never give out any information about yourself in response to an unsolicited phone call." ...

