Phishing for Answers
Cybersecurity for every audience.
Not your typical cyber blog.
Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.
This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
7 Things You Should Know about Malware
Slow web browsing, annoying pop-up ads, suspicious downloads…these could be an indication that your device has been affected by malicious software (malware). Read more to learn 7 important characteristics about malware - what it is, how it spreads, and what we can do about it.
Augmented and Virtual Reality: Innovative or Destructive?
You may know augmented reality (AR) or virtual reality (VR) in terms of the headsets in malls or electronics stores, where people spend hours immersed in an alternate reality. But what are the true effects of these technologies? Read more to learn both sides of the AR/VR debate and decide for yourself whether these digital solutions are innovative, destructive, or somewhere in between.
Pandemic Problems: The Rise of Ransomware Gangs
Why is ransomware such a hot topic in the cyber world today? Find out more about why the COVID-19 pandemic gave ransomware gangs more opportunities, more victims, and more money.
Why Do We Receive So Many Spam Calls and Texts?
Have you noticed an increase in spam calls and text messages? Wondering how to stop them? Read more about why spam calls are becoming so widespread, how callers get your phone number, and what you can do about it.
Cybersecurity Book Club: “Information Wars” by Richard Stengel
This quarter’s Cybersecurity Book Club choice is Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do about It by Richard Stengel. Find out more about one man’s fight against online disinformation and what he learned.
Xbox Underground: How Gamers Used Xbox to Hack into Microsoft, the US Army and More
Can video gaming pose a cybersecurity risk? Find out how a group of young hackers used Xbox to breach the computer systems of the US Army, Microsoft and several other companies.
How I Passed My First CompTIA Certification Exam
Read about the author’s top 5 recommendations for passing a Computer Technology Industry Association (CompTIA) certification exam.
Ways to Learn about Cybersecurity in Under 60 Minutes
Interested in cybersecurity but only have an hour to spare? Here are some learning options for those with a busy schedule.
How Ghana Saved a Global Conglomerate from a Cyberattack
When global shipping conglomerate fell victim to one of the world’s worst cyberattacks, the company’s entire network was on the brink of permanent damage. Until a power outage in Ghana saved everything.
Cybersecurity Book Club: “Sandworm” by Andy Greenberg
This quarter’s Cybersecurity Book Club book choice is Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, by Andy Greenberg. Learn more about elite Russian hacking groups and the future of cyber warfare.
#tbt - Why Analog Systems Are Still Relevant
Are we too dependent on technology? Find out how reverting back to older systems can help decrease this dependency and improve cyber resilience.