United States Cybersecurity Magazine

ProcessBolt

Card Skimmers: What are you Sliding Yourself Into?

Author(s):

Josh Henry, ,

Hand typing in ATM passcode on notepad while covering the keys for privacy, abstract for Card Skimmer

What are Card Skimmers? Mechanisms referred to as “card skimmers” have been a major threat to data security in recent years. These devices enable thieves to withdraw information from the magnetic strip of your card when its casually used at an ATM or store. As the trend grows, the devices become more sophisticated.  Banks, law … Read more

Password Safety: A Comprehensive Guide to Choosing a Good Password

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Password guesses on a notepad. First two are bad passwords and the third one is a more complex password.

Password security is the most basic and ubiquitous form of cybersecurity. Every single account created online has a password attached to it. They predate the internet by hundreds of years and to this day, they remain the most reliable form of user authentication. So why does everybody choose such terrible passwords? What Makes a Password … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

Pretexting: The Art of Impersonation

Author(s):

Patrick Putman, ,

Pretexting, hacker working on business interface, sinister, animated

What is Pretexting Pretexting is a social engineering tactic that uses deception and false motives. Simply put, pretexting crafts fictional situations to obtain personal, sensitive, or privileged information. Pretexting often involves researching the target prior to the attack. The data collected is then used to manipulate and deceive the victim. The main goal of the … Read more