Phishing for Answers
Cybersecurity for every audience.
Not your typical cyber blog.
Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.
This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
Conti: An Inside Look at Russia’s Powerful Ransomware Gang
Conti, one of Russia’s most notorious ransomware gangs, recently declared their support for the Kremlin in the ongoing war. Two days later, this cybercriminal group was hacked by a suspected Ukrainian researcher. Find out more about how this powerful ransomware group received a dose of its own medicine.
The Role of Underground Hacking Groups in the Russo-Ukrainian Cyber War
The Russian invasion of Ukraine has sparked involvement at every layer of the cyber world, including underground hacking groups. Within anonymized networks and dark web forums, hackers are increasingly engaging in Ukraine- and Russia-related activities. These cybercriminal groups are profiting by selling stolen data on the darknet and are even being recruited to aid in both sides of the war. Read more to learn about how covert hacking groups are playing an important role in the Russia-Ukraine conflict.
Letting the Cookie Crumble: How Misuse of Browser Cookies Can Affect Data Privacy
When browsing the Internet, you have likely encountered those annoying pop-up windows prompting you to accept cookies. But what exactly are Internet cookies? Find out more about why these bits of data are so important to the browsing experience and how they have been used to violate user data privacy.
How I Got My First Job in Cybersecurity
Excited to launch your career in cybersecurity, but unsure of how to get there? Read the author’s top 5 recommendations for landing that first opportunity in the field.
2021 Capitol Attack: How the FBI Used Technology to Identify the Protesters
Exactly 1 year ago today, protesters attacked the US Capitol building. Since then, over 700 people have been arrested in connection to these events, but how did US law enforcement manage to track them down? Read more to find out how technology and social media aided the FBI’s investigations in the aftermath of the events at the Capitol.
The Biggest Supply Chain Attacks of 2021
As the year of 2021 draws to a close, Phishing for Answers reflects back on some of the largest cyberattacks and how they disrupted the supply chain. Read our brief rundown of this year’s major supply chain attacks and the hackers that orchestrated them.
Log4j: The Security Vulnerability that Could Affect the Entire Internet
The cybersecurity world is currently reeling following the Apache Software Foundation’s public disclosure of the vulnerabilities in its Log4j software. Hundreds of millions of devices are potentially affected and hackers are rushing to exploit this zero day. Click to learn more about what is set to go down in history as one of the world’s largest cybersecurity events.
Your Social Media Account Was Hacked - Now What?
Politicians and high-profile celebrities are not the only ones who have had their social media accounts hacked - it can happen to any user! Recent research has shown that cybercriminals are increasingly targeting social media accounts to exfiltrate data and find other users to exploit. But what should you do if you become a victim? Find out more about which social media platforms are most often targeted, what steps to take if your accounts are hacked, and how to prevent it in the future.
How to Stay Cybersafe During the Holidays
‘Tis the season…to make cybersecure decisions! As people prepare to take vacations, spend time with family, and eat delicious treats, it is crucial to remember that cybercriminals are not taking a break. In fact, cyber attacks actually increase during this time of the year. Learn more about how you can stay cybersafe during the 2021 holiday season.
5 Things You Should Know about Social Engineering
Not all cyberattacks involve hacking, sometimes it just involves human deception. Social engineering seeks to exploit user psychology to gain access to valuable information. Read 5 important characteristics of social engineering attacks - what they look like, how they trick users, and ways to avoid becoming a victim.
Trojan Malware: A Bank’s Worst Nightmare
Between June and August 2021, a Trojan malware attack compromised the accounts of many banking customers in Mexico. The attackers stole user credentials, accessed their sensitive data, and even completely emptied some of the accounts - all without being detected. How did this malware execute such a devastating attack? Learn more about the exact methodologies used by these cybercriminals, as well as how financial institutions and their customers can work together to increase the security of online banking activities.
The Metaverse
Following Facebook’s rebranding as Meta, the metaverse is a trending topic in tech news today. But what is the vision for the metaverse, and how will it differ from any current technology? Are there any known security concerns related to the metaverse? Find out more to see where the tech world is heading!
#howitworks: Virtual Private Networks (VPNs)
This week’s #howitworks post discusses virtual private networks (VPNs). Learn more about how VPNs encrypt and secure internet connections, some VPN best practices, and how VPNs can help travelers Netflix and chill from any location. This post is the final part of this year’s #howitworks series, which aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: Internet of Things (IoT)
This week’s #howitsworks post is all about the Internet of Things (IoT). Read more to learn how Amazon Alexa and Apple Siri process voice signals, the different types of IoT technologies, and related security concerns. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: The Dark Web
This week’s #howitworks post is all about the dark web. Learn more about the legitimate and illegitimate uses of the dark web and how it ensures anonymous browsing. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: Denial-of-Service (DoS) Attacks
This week’s #howitworks post is all about denial-of-service (DoS) attacks. Learn more about these cyberattacks, why they are so common, and how to avoid becoming a victim. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: The Cloud
This week’s #howitworks post is all about the cloud - what it is, how it works, and how to protect data stored on the cloud. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
Cybersecurity Book Club: “The Cyber Effect” by Dr. Mary Aiken
We are now more aware than ever of the negative effects technology can have on users. But how exactly has the digital world impacted the human experience? This quarter’s Cybersecurity Book Club choice, The Cyber Effect by Dr. Mary Aiken, aims to answer all of our questions about why technology tends to be so addictive and time-consuming, how it impacts child development, and how it facilitates criminal activity.
All about My First Cybersecurity Conference
Read about the author’s experience at the Women in Cybersecurity (WiCyS) annual conference in Denver, CO – the topics of discussions, the connections that were made, and lessons learned.
Crisis in Afghanistan: The Cybersecurity Perspective
There are many aspects of the ongoing crisis in Afghanistan - humanitarian, political, regional, economic, etc. But what about the cybersecurity implications of the recent events in the country? What types of sensitive data can Taliban militants now access? How can the Afghan people protect their private information? And how can the Taliban’s increased access to government databases and military technology potentially harm US national security? Read more to learn about what the Taliban’s rise to power means for the global cyberspace.