Introduction Phishing is the buzzword in everyone’s mouth. As the most common method of cyber-threat, it’s a way of playing...
Generative AI: What Is It and Is It a Danger to Us?
Introduction Artificial intelligence contributes heavily to the battle of cyber-threats versus cybersecurity, on both sides...
Is Your Information on People-Finding Websites?
Introduction There are hundreds of so-called “people-finding websites” out there, also known as people search sites, and...
When Deepfakes Land You in Deep Waters
Introduction Artificial intelligence has exploded in a brand new way the past couple of years. The emergence of advanced...
What’s Up With the Privacy Allegations Against Snapchat AI?
Introduction The Federal Trade Commission (FTC) has recently filed a complaint against popular social media application,...
When AI Leads to Legal Disputes
Introduction Artificial intelligence is now a pervasive part of everyday life. Nearly half of all businesses use AI in...
How Do Authenticator Apps Protect Data Privacy?
Introduction When it comes to protecting your profiles and credentials, MFA is the best way we currently have to stop...
Is Triple Extortion The Next Big Ransomware?
Introduction You’ve heard of ransomware. Often victims feel pressured to pay the fee…which is when the threat actor uses...
New “DarkGate” Ransomware Targets Team Communication Apps
Introduction Do you use Skype? What about Microsoft Teams? Maybe you have AnyDesk to help with remote access to your...