Likejacking

Likejacking is a type of malicious activity that occurs when an attacker tricks a user into clicking a like button or link on a social networking site like Facebook, Twitter, or LinkedIn. When the user clicks the button or link, they unwittingly share the attacker’s content with all of their friends or followers. This can … Read more

Weaponized information

Weaponized information is information that has been used to harm or manipulate someone. This can include false or misleading information, as well as information that is true but being used in a malicious way. Weaponized information can be used to damage someone’s reputation, interfere with their work or personal life, or even put their safety … Read more

Automated Clearing House fraud (ACH fraud)

ACH fraud is a type of fraud that occurs when an unauthorized person or entity gains access to a victim’s bank account information and uses it to initiate unauthorized ACH transactions. These transactions can be either ACH debits, which withdraw funds from the account, or ACH credits, which deposit funds into the account. ACH fraud … Read more

Mobile number privacy

Mobile number privacy is the ability to keep one’s mobile phone number private, and to control who has access to it. It is important to have mobile number privacy to avoid unwanted calls and texts, and to protect one’s identity and personal information. There are a number of ways to achieve mobile number privacy, including … Read more

Cognitive security

Cognitive security is an area of security that deals with protecting against threats that exploit the cognitive abilities of humans. These threats can take many forms, including social engineering, phishing, and other forms of fraud. Cognitive security is a relatively new area of security, and there is still much research to be done in this … Read more

Data breach response plan

A data breach response plan is a formalized process for addressing and managing a data security breach. The plan should be designed to minimize the damage caused by the breach, and to protect the organization’s reputation. The plan should be tailored to the organization’s specific needs, and should be reviewed and updated on a regular … Read more

NIST 800 Series

The National Institute of Standards and Technology (NIST) 800 Series is a set of publications that provides guidance on topics related to information security. The series includes guidance on risk management, security controls, incident response, and more. What is NIST 800 compliance? NIST 800 compliance is a set of standards and guidelines for managing information … Read more

Medical identity theft

Medical identity theft occurs when someone uses another person’s personal information, such as their name, date of birth, Social Security number, or health insurance information, to obtain medical care, prescription drugs, or health insurance. The thief may use this information to receive medical care or submit false claims to health insurance providers, which can result … Read more

Wipe

When you “wipe” a device, you are essentially factory resetting it. This means that all of the data on the device will be erased, including any malware that may be present. This is usually done as a last resort when all other attempts to clean the device have failed. Is wipe an English word? Yes, … Read more

Stegano

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from the Greek words steganos (στεγανός), meaning “covered, concealed, or protected”, and graphein (γράφειν) meaning “writing”. Steganography is often used to protect sensitive data or communication from eavesdroppers. For example, a sender … Read more