While watching Davin Teo’s TEDx talk on digital forensics, I found his career path very intriguing. During his talk, Teo described how he got started in the field of digital forensics, starting with his early fascination with computers and technology… Continue Reading →
The five most severe offenses among the illegal activities done by internet users are sharing passwords, addresses, or photos of others; bullying and trolling; recording a VoIP call without consent; collecting child information; and running illegal searches on the internet…. Continue Reading →
In “Hacking for Good: Leveraging HackerOne Data to Develop an Economic Model of Bug Bounties,” Kiran Sridhar and Ming Ng discuss how to build an economic model for bug bounties using data from HackerOne, a platform for vulnerability coordination and… Continue Reading →
Customers who visit the website www.glasswasherparts.com are notified of a data breach. The breach happened between February and December 2016 but was found in November. Hackers could obtain their clients’ credit card information by installing malware on the server platform…. Continue Reading →
In Nicole Enesse’s YouTube video “What does a Cybersecurity Analyst Do? Salaries, Skills & Job Outlook,” several social elements highlight the connections between cybersecurity and social behavior. Firstly, the focus on teamwork and communication emphasizes how crucial relationships are for… Continue Reading →
Lt. Col. David M. Beskow and Kathleen M. Carley’s “Social Cybersecurity: An Emerging National Security Requirement” explores social cybersecurity as an essential component of national security. This article stresses the necessity for a strategy to address these issues by highlighting… Continue Reading →
When taking the Social Media Disorder Scale, I scored a two out of nine. I said yes to persistence and displacement traits, neglecting other activities to use social media and trying to use social media but failing. I think the… Continue Reading →
In today’s digital era, where technology is ingrained in every part of our lives, the media is crucial in influencing how we perceive cybersecurity. Thinking back on how the media shapes our understanding of cybersecurity, it is clear the media… Continue Reading →
The man in this first meme is a cybercriminal. He is setting up a fake network disguised as the Starbucks network to bait victims into connecting. The man hs a devious grin on his face as he executed this phishing… Continue Reading →
When determining whether a website is real or fake, there are a couple of identifiers to help someone avoid fake, shady websites. Firstly, checking the domain can identify whether a website is fake. Fake websites will try to resemble the… Continue Reading →
© 2025 Noah Salafranca — Powered by WordPress
Theme by Anders Noren — Up ↑