[4-minute read] There are a lot of news going on related to coronavirus pandemic. As a matter of fact, coronavirus is considered a "breakout" in Google trends - this means this topic has seen a tremendous increase in searches. On this version of #humanfirewalltipoftheday , we have used coronavirus to compare some of the cyber security terminologies like zero-day virus, patient zero and pandemic. These terms, although used in medical terms, are also widely used in cyber security especially during malicious software (malware) analysis.
According to DitchtheLabel, Instagram is the top social media site where young people are getting cyberbullied and harassed online. Online bullying activities can range from sending screenshots/pictures of someone to laugh at them, trolling others in a game, mocks others through sharing or liking a page or sending abusive messages to someone.
[2-minute read] According to the CEO Magazine, "Prevention is better than the cure for cybersecurity because the costs of a successful attack can be astronomical, even if it is mitigated quickly." Although this article is targeting the corporate world, this is also relatable in our personal lives. Imagine you are a victim of a phishing wherein the phisherman was able to access your bank account.
[4-minute read] We have shared Social Engineering information from our Human Firewall Tips number 7 to 9. Now on this version of #humanfirewalltipoftheday, we are sharing what are the common Social Engineering Indicators (SEI). SEI are signs or red flags that you are potentially getting scammed or tricked into doing something that you are not even aware of until you learned about the after effect.
[3-minute read] One of the social engineering techniques that we have discussed in Human Firewall Tip # 7 is Phishing. Imagine, an attacker or a "phisher-man" sends thousands of emails across. Once the phishing email is successfully sent out, it is a matter of waiting game until someone fell into the "trap" which is either malicious link was clicked or downloaded a malware-infected attachment. As a simple analogy, this is one (phisher-man) to many (potential victims with email addresses).