Michael File
Member since: Jul 02, 2015
Published articles: 4
Reputation Attack: Lessons Learned from the Ashley Madison BreechThe Ashley Madison hack and subsequent release of the site’s Users information is a scary indication of things to come. Many hackers...
To know how to stop cyber attacks you need to know how they work. The following seven steps describe the anatomy of a cyber attack: The cyber criminal, or hacker, gains entry through an email, a...
Point-of-sale attacks happen when hackers use malicious software expressly written to steal customer payment data, especially credit card data, from retail checkout systems. Hackers, or Cyber...
Ransom ware is malware for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. Ransom ware spreads through e-mail attachments...
Home Cyber Defense Weekly We will be delivered to your email inbox every Friday. You have the option to read it as an email or download the newsletter as a Pdf on your computer or mobile device.