- Social Networking Why There Are Fewer LinkedIn Scams and Malware Than Facebook Ones
LinkedIn sees fewer scams than Facebook because users visit less frequently, its apps platform is limited, and professional mindset makes users more cautious. However, LinkedIn is still risky—many...
- Assessments 3 Reasons Why People Choose to Ignore Security Recommendations
People avoid information that challenges beliefs, demands undesired action, or causes unpleasant emotions—all common with security assessments. Recipients may resist findings that contradict "my...
- Malware AppLocker for Containing Windows Malware in the Enterprise
AppLocker in Windows 7 and Server 2008 R2 can block known malicious executables based on publisher signature, file location, or hash—distributed centrally via Group Policy. This helps contain malware...
- Malware The Use of the Modern Social Web by Malicious Software
Modern malware exploits the social web ecosystem: using social networking sites for command-and-control, controlling social media content for financial/political rewards, distributing links for...
- Risk Management The Contagious Smell of Fear in Cybersecurity
Security decisions are affected by factors beyond rational analysis—choice fatigue, sleep deprivation, and anxiety. Research shows fear can spread through scent; women who smelled "fearful sweat"...
- Malware The Use of Social Engineering by Mobile Device Malware
Mobile malware spreads primarily through social engineering rather than exploits. Techniques include disguising trojans as legitimate apps (DroidDream looked like "Super Guitar Solo"), directing...