Phishing for Answers
Cybersecurity for every audience.
Not your typical cyber blog.
Welcome to Phishing for Answers, a site that provides information about cyber news, technology policy, and information security management.
This blog is intended to inform every type of reader, from experienced professionals to those with a general interest in cybersecurity. Because online data protection is first and foremost a human problem, Phishing for Answers strives to publish content that can be consumed by everyone.
Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Remember LAPSUS$, the group of teenage hackers that breached Microsoft, Okta, T-Mobile and the Brazilian Ministry of Health? Although most of LAPSUS$ leaders were arrested earlier this year, the cybersecurity community can still learn from these cybercriminals. Through the use of intelligence methodologies and cyber threat intelligence (CTI) frameworks, we explore the capabilities of this hacking unit.
How I Got My First Job in Cybersecurity
Excited to launch your career in cybersecurity, but unsure of how to get there? Read the author’s top 5 recommendations for landing that first opportunity in the field.
5 Things You Should Know about Social Engineering
Not all cyberattacks involve hacking, sometimes it just involves human deception. Social engineering seeks to exploit user psychology to gain access to valuable information. Read 5 important characteristics of social engineering attacks - what they look like, how they trick users, and ways to avoid becoming a victim.
#howitworks: Virtual Private Networks (VPNs)
This week’s #howitworks post discusses virtual private networks (VPNs). Learn more about how VPNs encrypt and secure internet connections, some VPN best practices, and how VPNs can help travelers Netflix and chill from any location. This post is the final part of this year’s #howitworks series, which aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: Internet of Things (IoT)
This week’s #howitsworks post is all about the Internet of Things (IoT). Read more to learn how Amazon Alexa and Apple Siri process voice signals, the different types of IoT technologies, and related security concerns. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: The Dark Web
This week’s #howitworks post is all about the dark web. Learn more about the legitimate and illegitimate uses of the dark web and how it ensures anonymous browsing. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: Denial-of-Service (DoS) Attacks
This week’s #howitworks post is all about denial-of-service (DoS) attacks. Learn more about these cyberattacks, why they are so common, and how to avoid becoming a victim. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
#howitworks: The Cloud
This week’s #howitworks post is all about the cloud - what it is, how it works, and how to protect data stored on the cloud. The #howitworks series aims to help readers to gain a basic understanding of important technologies and related security implications. This series is a part of Cybersecurity Awareness Month 2021, which is dedicated to raising awareness about cybersecurity issues and data protection.
All about My First Cybersecurity Conference
Read about the author’s experience at the Women in Cybersecurity (WiCyS) annual conference in Denver, CO – the topics of discussions, the connections that were made, and lessons learned.
7 Things You Should Know about Malware
Slow web browsing, annoying pop-up ads, suspicious downloads…these could be an indication that your device has been affected by malicious software (malware). Read more to learn 7 important characteristics about malware - what it is, how it spreads, and what we can do about it.
How I Passed My First CompTIA Certification Exam
Read about the author’s top 5 recommendations for passing a Computer Technology Industry Association (CompTIA) certification exam.
Ways to Learn about Cybersecurity in Under 60 Minutes
Interested in cybersecurity but only have an hour to spare? Here are some learning options for those with a busy schedule.