Hook, line and bait – no we’re not fishing, we’re phishing. This cyberattack is a form of social engendering. Sometimes the attacker approaches you via a telephone call, other times it’s via e-mail, sometimes the attacker is bold enough to even show up in person. This is one of the most preventable attacks out there, but time and again we see our neighbors caught on someone’s hook.
Researching ways to improve scientist’s access to data. Programming software to solve humanity’s problems. Disseminating emergency preparedness knowledge. Sharing knowledge about science. Practicing amateur radio. Serving humanity through volunteer efforts. Drives a robot to work.
Six of the top fifteen threats in 2010 were from Malware. These vicious little programs are designed to do everything from breaking security protocols to logging the keys that your users are typing. In the “2011 Data Breach Investigations Report” as published by the Verizon RISK Team in cooperation with the U.S. Secret Service and the Dutch High Tech Crime Unit; the top two threats were both malware, the top threat was designed to forward data from your secured network and send it to a third party while the very close second level threat was created to allow a nefarious person to remotely access and control your computers.
Researching ways to improve scientist’s access to data. Programming software to solve humanity’s problems. Disseminating emergency preparedness knowledge. Sharing knowledge about science. Practicing amateur radio. Serving humanity through volunteer efforts. Drives a robot to work.