With so much public attention to viruses, ransomware and cyberattacks, you might think that you’ve heard all the possible ways someone can attack your computers or mobile devices. But there are many bad actors who have devised devious ways to get your data through public charging stations, USB hub power stations and thumb drives.
Currently, threats to your computer often involve some type of virus or hostile file. But fileless malware is a new and growing hazard in cybersecurity.
Due diligence with websites helps you detect bogus vendors. There are ways to determine whether or not a company is legitimate.
APUS recently conducted a research trip in Alaska to explore how information technology is being implemented in native American communities and how it's affecting their lives.
One consistent theme throughout Cybertech Fairfax 2017, which took place on Tuesday, June 13, was the critical need for innovative technology that safeguards against cyber intrusion.
Michael Chertoff advises leaders to take a risk management, immunization approach for effective systems security at a DC-area cybersecurity conference.
My recent article, “Cyber Defenders Are Often Not Fired, When Others Would Be” stirred responses from many physical security professionals.
There is a new attack related to the recent international WannaCry (also known as WanaCrypt0r 2.0) hack that occurred last month. As of May 14, this hack had affected more than 70,000 computers and netted the hackers at least $15 million.
Is it fair that cyber defenders or information technology security specialists are usually not fired after a cyberattack?