Cybersecurity Awareness Articles
-
The Ashley Madison Hack
Hope Trampski - Nov. 01, 2024
Hacking almost always results in the release of personal information. Whether that be credit card numbers, social security numbers, or other sensitive data, leaks happen all the time. In the case… Read More
-
AI As A Tool
Hope Trampski - Oct. 28, 2024
What AI Looks Like Day to Day AI is an ever-evolving field, it seems that every day there is something new in the works. The topic of AI can get pretty complicated pretty quickly. So, realistica… Read More
-
The Dennis Kucinich CBS News Hack
Hope Trampski - Oct. 25, 2024
Hacking, in most cases, is a very selfish act. Most hackers are in it for the money or the information they can turn into money. But in some cases, hackers commit cybercrime because they believe … Read More
-
How Not to Take the Bait When it Comes to Phishing
Hope Trampski - Oct. 21, 2024
Phishing is one of the most common forms of cybercrime, with around 3.4 billion phishing emails sent each day it is nearly impossible to avoid. The good news is that falling victim to these scams… Read More
-
The Triton Malware Attack
Hope Trampski - Oct. 18, 2024
Completely unsolved cybercrime cases are relatively rare. Normally when an attack ensues, one of the most important proceedings is to trace it back to the attacker. This is especially important w… Read More
-
Why Are Software Updates So Important?
Hope Trampski - Oct. 14, 2024
The importance of keeping your software up to date cannot be stressed enough. Often, we find ourselves putting off these updates because it can be inconvenient to be without our devices for the p… Read More
-
The Mystery of the WANK Worm
Hope Trampski - Oct. 11, 2024
In 1989, Galileo, a nuclear-powered spacecraft created by NASA, was set to launch. Its existence was controversial having been announced in the wake of the Challenger Disaster, but that wasn’t th… Read More
-
Multi-Factor Authentication
Hope Trampski - Oct. 07, 2024
To expand on our discussion about secure passwords from last week, let’s look at multi-factor authentication. Multifactor has only been around for about twenty years, but that's a good chunk of t… Read More
-
Broadcasting Masks and Mayhem
Hope Trampski - Oct. 04, 2024
Welcome to spooky season, we are so glad you could join us for our October series on unsolved cybercrimes! While it might be comforting to think we know the origin of every instance of malicious … Read More
-
Password Security and Password Managers
Hope Trampski - Oct. 02, 2024
Ensuring proper password safety is a never-ending task, mostly because the rules seem to keep changing. The rules used to seem easy; create a password you’ll remember. Oh wait, that’s too easy, t… Read More
-
Where are we now?
Hope Trampski - Sep. 17, 2024
Even after decades of development in our field, one thing stays consistent, change. There are always new threats, new vulnerabilities, new fixes. The only thing that stays the same is that things… Read More
-
How much do you know about Stuxnet?
Hope Trampski - Sep. 03, 2024
The Stuxnet Worm was discovered in June of 2010 by Sergey Ulasen, an employee of VirusBlokAda, a small antivirus company. At first it was mistaken as an arbitrary Windows bug, just a conflict bet… Read More
-
Eagle Eye: AI and Its Ethical Concerns
Hope Trampski - Aug. 30, 2024
Eagle Eye Eagle Eye, released in 2008, is an action-packed techno-thriller that left audiences clutching their popcorn with anticipation- not because the film was mysterious or nuanced, but beca… Read More
-
Hackers of the 2000s
Hope Trampski - Aug. 27, 2024
If you thought the ‘90s were packed with cybercrime, the next decade brought an even greater wave of cyber threats. The rapid evolution of the internet introduced a multitude of unprecedented cha… Read More
-
Enemy of Realistic Surveillance Depictions
Hope Trampski - Aug. 23, 2024
Enemy of the State, a widely popular political action thriller starring Will Smith is much more than just a gripping nail-biter, it was a look into the realities of modern-day surveillance techni… Read More
-
The ILOVEYOU Worm, A Global Crisis
Hope Trampski - Aug. 20, 2024
The ILOVEYOU worm is known as one of the farthest reaching occurrences of malware to date, having affected around 45 million users in only 10 days. The worm caused around $10 billion in damages, … Read More
-
Cyber Unrealism: The Net
Hope Trampski - Aug. 16, 2024
The Net 1995 The 1995 film, The Net, starring Sandra Bullock was one of Hollywood's first attempts at an action-packed cyber thriller. It follows the main character Angela Bennett as she goes on … Read More
-
Hackers of the '90s
Hope Trampski - Aug. 13, 2024
In 1990, the turn of the decade saw a massive uptick in the number of computer hackers as the internet evolved into the tool we know it as today. While the World Wide Web didn’t become available … Read More
-
The Beekeeper, Keeping it Unrealistic
Hope Trampski - Aug. 09, 2024
The Beekeeper, released in January of this year, is an action suspense thriller that stars Jason Statham with a premise around cyber scams. We follow him through a campaign of vengeance as he tri… Read More
-
Porches and Pacific Bell Dumpsters
Hope Trampski - Aug. 06, 2024
In 1990 in Los Angeles, California, Michael B. Peters won a Porsche from the Los Angeles radio station KIIS-FM. Well...not really. Kevin Poulsen is a well-known hacker who took over all the tel… Read More
-
Hackers, a '90s Cautionary Tale
Hope Trampski - Aug. 02, 2024
Hackers, released in 1995, showcased ridiculous visuals and at times an equally ridiculous portrayal of hackers. It is chalked full of ‘90s cyberpunk flair. If this movie could be summed up in on… Read More
-
Viruses of the 80s
Hope Trampski - Jul. 30, 2024
As we discussed in a recent blog post, Creeper is known as the first computer virus. However, the first malicious virus was actually created by a 15-year-old high school student named Rich Skrent… Read More
-
The Matrix, Far From Reality?
Hope Trampski - Jul. 26, 2024
The 1999 film The Matrix was a revisionary movie in plot, special effects, and references to modern technology. It fascinated audiences with action, drama, and high stakes all while keeping to a … Read More
-
Do you know what the Morris worm is?
Hope Trampski - Jul. 23, 2024
In 1988 there was only a meager 60,000 computers connected to the internet. But this low number of the late 80s may have been for the best. On November 2nd, 1988, the Morris worm began to wreak h… Read More
-
War Games and Grim Warnings
Hope Trampski - Jul. 19, 2024
The film War Games, released in 1983, captivated audiences with a thrilling depiction of military super computers and the possibility of nuclear war. Hidden within the story of a young boy with a… Read More
-
Kevin Mitnick, sound familiar?
Hope Trampski - Jul. 16, 2024
Kevin Mitnick is known as one of the world’s first cybercriminals, but before his infamous hacking career, he got his start in social engineering at only twelve years old. Living in Los Angeles, … Read More
-
Sneakers, a 90s Cyber Success
Hope Trampski - Jul. 12, 2024
Here at cyberTAP we value real world applications, and as cyber professionals, we understand the practical nuances of our industry and how it applies to everyday life. However, the same can’t alw… Read More
-
How much do you know about the history of cybersecurity?
Hope Trampski - Jul. 09, 2024
Welcome to our deep dive into the history of cybersecurity! Join us as we uncover the development of our field through the decades by looking into some of the most notorious hacks and cybercrimin… Read More
-
Everyday Habits That'll Increase Your Cybersecurity
Staff Author - Nov. 30, 2021
Before coming to cybersecurity, many professionals have different ideas and practices than are required to preserve the security of information. These practices often include: clicking on links i… Read More
-
Cybersecurity Awareness Month: Secure Your Phishing Defenses
Staff Author - Oct. 12, 2021
From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on… Read More
-
Cybersecurity Awareness Month: Get Familiar with the Cyber Basics
Staff Author - Oct. 05, 2021
At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWind… Read More