Saudi Journalist Jamal Khashoggi, Chairman of Hilary Clinton’s 2016 presidential campaign John Podesta and the Ukrainian power grid. What do all of these have in common? The answer: they were all victims of computer phishing attacks.
These attacks delivered malware that took over their device, resulting in Khashoggi’s eventual murder, the leaking of John Podesta’s emails disrupting the 2016 US election and the Ukrainian power grid being temporarily disabled.
Despite the cited examples being quite high-profile, that doesn’t mean phishing attacks are only used against high-value targets. Quite the contrary, they are the most common form of cyber-attack used today…
On November 21 2019, Borat Star Sacha Baron Cohen gave his keynote address to the ADL’s Never is Now Summit on Anti-Semitism and Hate.
In it, he takes aim at social media companies for their role in facilitating rising hatred and misinformation. Further, he posits solutions that touch on free speech rights and technological feasibility.
This article is my analysis. I will be focusing only on what I can definitively say is true, and will be leaving inferences out to prevent my bias from influencing my ability to be impartial. …
Recently I was observing my friends trying to log in to their accounts. ‘Trying’ being the operative word. I’m always stunned by how poor the average person’s online security is against the unauthorised, but also how impressive their security is against themselves.
This article will first cover some background information on passwords: their importance, how to create a good one, and why using one password across accounts doesn’t work. I will then provide three solutions: Two-Step Verification, Password Managers and Password Database Breach Monitoring.
By the end of the article, you should have learned how to secure all your online…
IT Consultant. Writer for The Startup. Specialising in the Business and Governance of Technology and Cyber Security. @Daniel_vanDriel