Introduction Not long ago, if you saw a video of someone speaking, then you trusted it was real. That is no longer a safe...
A Popular Tool Was Compromised — Here’s Why That Matters to You
Introduction Most people never think about the software behind the apps they use every day. They simply open a program, log...
How to Recognize and Beat AI Bias
Introduction So many people use artificial intelligence every day. We use it to filter our settings; recommend posts and...
The Most Common Ways Workers Accidentally Put Data at Risk
Introduction When we hear about cyber-crime, we often imagine far-off threat actors setting complex traps to mess with huge...
The Hidden Dangers of Outdated Systems
Introduction If a device still turns on and does what you need it to do, many people don’t look further. We keep using...
Why Hackers Go After Universities And What It Means for Your Data
Introduction We often think of universities as places for research, discovery, and education — not targets for...
What Is “Read-Only” Access and Why Does It Matter?
Introduction Not everyone who accesses a system needs the ability to change it. In fact, many security incidents happen...
What is Piggybacking?
Introduction Not all security breaches involve malware, phishing emails, or hacked passwords. Some start with a simple act...
Malvertising: When Online Ads Become a Delivery System for Malware
Introduction Most people think of online ads as annoying, but not dangerous. A banner pops up. A video auto-plays. A...



