{"id":309,"date":"2025-12-03T04:20:28","date_gmt":"2025-12-03T04:20:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/?page_id=309"},"modified":"2025-12-08T01:37:10","modified_gmt":"2025-12-08T01:37:10","slug":"resources","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n<p><em>19 billion compromised passwords leaked in the largest breach compilation yet<\/em>. (2025, April 30). Cybernews. https:\/\/cybernews.com\/security\/password-leak-study-unveils-2025-trends-reused-and-lazy<strong><\/strong><\/p>\n\n\n\n<p>Bonnie, E. (2024, December 31).\u00a0<em>60+ Social Engineering Statistics for 2023<\/em>. Secureframe. https:\/\/secureframe.com\/blog\/social-engineering-statistics<\/p>\n\n\n\n<p>Cimpanu, C. (2019, August 27).\u00a0<em>Microsoft: Using multi-factor authentication blocks 99.9% of account hacks<\/em>. ZDNet. https:\/\/www.zdnet.com\/article\/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks\/<\/p>\n\n\n\n<p>Cuprik, R. (2025, June 27). <em>NFC data for contactless payments are the new target. Here is what you need to know.<\/em> Eset.com. https:\/\/www.eset.com\/blog\/en\/home-topics-1\/cybersecurity-protection\/now-it-is-certain-nfc-data-for-contactless-payments-are-the-new-target-here-is-what-you-need-to-know\/<\/p>\n\n\n\n<p><em>Data compromised with public Wi-Fi<\/em> &nbsp;(2024). Statista. https:\/\/www.statista.com\/statistics\/1450743\/public-wifi-use-personal-data-compromise-us\/?srsltid=AfmBOopavZXrPpmtFBaNCCqaYr9cz5oxSgL7ZGeJPkfYI3Rr816TXSgJ<\/p>\n\n\n\n<p><em>eTextbook: CompTIA Security + Guide to Network Security Fundamentals, 8th Edition &#8211; 9798214000787 &#8211; Cengage<\/em>. (2024). Cengage.com. https:\/\/www.cengage.com\/c\/etextbook-comptia-security-guide-to-network-security-fundamentals-8e-ciampa\/9798214000787\/<\/p>\n\n\n\n<p><em>How to identify misinformation, disinformation and malinformation<\/em> (May 2024). Canadian Centre For Cyber Security. https:\/\/www.cyber.gc.ca\/sites\/default\/files\/misinformation-mesinformation-itsap.00.300-en.pdf<\/p>\n\n\n\n<p>Inc, A. (2023, August 31).&nbsp;<em>How to Choose the Best Biometric Authentication Method | FAQs<\/em>. Aware. https:\/\/www.aware.com\/blog-how-to-choose-the-best-biometric-authentication-method\/<\/p>\n\n\n\n<p>James, N. (2023, May 8).&nbsp;<em>Key Malware Statistics in This Decade: 2020\u20132023 &#8211; Astra Security Blog<\/em>. Astra. https:\/\/www.getastra.com\/blog\/security-audit\/malware-statistics\/<\/p>\n\n\n\n<p>Khalil, M. (2025, August 12).&nbsp;<em>Ransomware Recovery Costs in 2025: The True Price of an Attack<\/em>. DeepStrike. https:\/\/deepstrike.io\/blog\/ransomware-recovery-costs-2025<\/p>\n\n\n\n<p><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>19 billion compromised passwords leaked in the largest breach compilation yet. (2025, April 30). Cybernews. https:\/\/cybernews.com\/security\/password-leak-study-unveils-2025-trends-reused-and-lazy Bonnie, E. (2024, December 31).\u00a060+ Social Engineering Statistics for 2023. Secureframe. https:\/\/secureframe.com\/blog\/social-engineering-statistics Cimpanu, C. (2019, August 27).\u00a0Microsoft: Using multi-factor authentication blocks 99.9% of account&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/resources\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31783,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/users\/31783"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/309\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/pages\/309\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse600dillingham\/wp-json\/wp\/v2\/media?parent=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}