Phishing for Answers
Cybersecurity for every audience.
Not your typical cyber blog.
Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.
This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
The Metaverse
Following Facebook’s rebranding as Meta, the metaverse is a trending topic in tech news today. But what is the vision for the metaverse, and how will it differ from any current technology? Are there any known security concerns related to the metaverse? Find out more to see where the tech world is heading!
#howitworks: Internet of Things (IoT)
This week’s #howitsworks post is all about the Internet of Things (IoT). Read more to learn how Amazon Alexa and Apple Siri process voice signals, the different types of IoT technologies, and related security concerns. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
Cybersecurity Book Club: “The Cyber Effect” by Dr. Mary Aiken
We are now more aware than ever of the negative effects technology can have on users. But how exactly has the digital world impacted the human experience? This quarter’s Cybersecurity Book Club choice, The Cyber Effect by Dr. Mary Aiken, aims to answer all of our questions about why technology tends to be so addictive and time-consuming, how it impacts child development, and how it facilitates criminal activity.
Crisis in Afghanistan: The Cybersecurity Perspective
There are many aspects of the ongoing crisis in Afghanistan - humanitarian, political, regional, economic, etc. But what about the cybersecurity implications of the recent events in the country? What types of sensitive data can Taliban militants now access? How can the Afghan people protect their private information? And how can the Taliban’s increased access to government databases and military technology potentially harm US national security? Read more to learn about what the Taliban’s rise to power means for the global cyberspace.
7 Things You Should Know about Malware
Slow web browsing, annoying pop-up ads, suspicious downloads…these could be an indication that your device has been affected by malicious software (malware). Read more to learn 7 important characteristics about malware - what it is, how it spreads, and what we can do about it.
Augmented and Virtual Reality: Innovative or Destructive?
You may know augmented reality (AR) or virtual reality (VR) in terms of the headsets in malls or electronics stores, where people spend hours immersed in an alternate reality. But what are the true effects of these technologies? Read more to learn both sides of the AR/VR debate and decide for yourself whether these digital solutions are innovative, destructive, or somewhere in between.
Pandemic Problems: The Rise of Ransomware Gangs
Why is ransomware such a hot topic in the cyber world today? Find out more about why the COVID-19 pandemic gave ransomware gangs more opportunities, more victims, and more money.
Why Do We Receive So Many Spam Calls and Texts?
Have you noticed an increase in spam calls and text messages? Wondering how to stop them? Read more about why spam calls are becoming so widespread, how callers get your phone number, and what you can do about it.