130 episodes

Learn the latest Cybersecurity updates in the tech world.

Cybersecurity Tech Brief By HackerNoon HackerNoon

    • Technology

Learn the latest Cybersecurity updates in the tech world.

    Factors to Consider in Crafting Effective Security Awareness Training

    Factors to Consider in Crafting Effective Security Awareness Training

    This story was originally published on HackerNoon at: https://hackernoon.com/factors-to-consider-in-crafting-effective-security-awareness-training.
    Discover key factors for crafting effective security awareness training. Enhance your organization's security with these essential insights.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cyber-threats, #security-awareness-training, #employee-training, #security-best-practices, #training-strategies, #information-security, #security-policies, #cybersecurity-for-businesses, and more.


    This story was written by: @favourefe. Learn more about this writer by checking @favourefe's about page,
    and for more stories, please visit hackernoon.com.



    Germany sets the pace with an impressive 85% of employees recognizing the risk of email attachments. Organizations are recognizing the need for security awareness training. However, providing materials alone is not enough to determine its effectiveness. Crafting profound influential security awareness involves various careful considerations to customize the program to the specific needs and challenges of the organization.

    • 12 min
    Memcyco Report Reveals 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

    Memcyco Report Reveals 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

    This story was originally published on HackerNoon at: https://hackernoon.com/memcyco-report-reveals-6percent-of-brands-can-protect-their-customers-from-digital-impersonation-fraud.
    Notably, Memcyco’s research indicates that the majority of companies do not have adequate solutions to counter digital impersonation fraud, and that most only l
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cybersecurity, #memcyco, #cyberwire, #press-release, #memcyco-announcement, #digital-identity, #cyber-threats, #good-company, and more.


    This story was written by: @cyberwire. Learn more about this writer by checking @cyberwire's about page,
    and for more stories, please visit hackernoon.com.



    Memcyco Inc. released its inaugural 2024 State of Website Impersonation Scams report. Just 6% of brands claimed to have a solution that effectively addresses these attacks. 72% of companies have a monitoring system in place to detect fake versions of their website, but still, 66% said that they primarily learn about digital impersonation attacks from customers.

    • 4 min
    Online Safety: How to Keep Your Digital Accounts Secure

    Online Safety: How to Keep Your Digital Accounts Secure

    This story was originally published on HackerNoon at: https://hackernoon.com/online-safety-how-to-keep-your-digital-accounts-secure.
    Explore ways to stay safe on the internet and why online security is important.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #security, #cybersecurity, #cyber-security-awareness, #cybersecurity-tips, #multifactor-authentication, #passwordless, #password-manager, #login, and more.


    This story was written by: @rohitjmathew. Learn more about this writer by checking @rohitjmathew's about page,
    and for more stories, please visit hackernoon.com.



    This article explores common security threats and offers strategies to protect yourself online. Some recommendations include using passwordless login methods like Face ID or Passkeys, using password managers like 1Password, and implementing multi-factor authentication (MFA). These measures can greatly improve your online security and reduce the risk of unauthorized access to your accounts.

    • 9 min
    An Overview of Network Intrusion Tactics: Denial of Service (DOS) Attacks

    An Overview of Network Intrusion Tactics: Denial of Service (DOS) Attacks

    This story was originally published on HackerNoon at: https://hackernoon.com/an-overview-of-network-intrusion-tactics-denial-of-service-dos-attacks.
    This article describes the denial of service intrusion tactic and outlines selected methods and types associated with it, with a focus on network-level threats.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #ddos, #denial-of-service-attacks, #what-is-a-dos-attack, #different-dos-attacks, #distributed-denial-of-service, #network-level-dos-attack, #cyber-attack, #different-cyber-attacks, and more.


    This story was written by: @kultured. Learn more about this writer by checking @kultured's about page,
    and for more stories, please visit hackernoon.com.



    Denial of service (DoS) attacks are attacks that flood a network or server with traffic. The objective of this attack is to disrupt normal business operations by overloading an organization’s network with the goal of sending so much information that the network crashes or is unable to respond to legitimate users.

    • 3 min
    Cybersecurity Risks Worth Considering in Online Trading

    Cybersecurity Risks Worth Considering in Online Trading

    This story was originally published on HackerNoon at: https://hackernoon.com/cybersecurity-risks-worth-considering-in-online-trading.
    As online trading platforms grow in popularity, hackers increase their attacks. Here are the cybersecurity risks in online trading.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cybersecurity, #online-trading, #trading, #malware, #social-engineering, #regulatory-frameworks, #brokerage-fraud, #hackernoon-top-story, and more.


    This story was written by: @zacamos. Learn more about this writer by checking @zacamos's about page,
    and for more stories, please visit hackernoon.com.



    Cybersecurity risks in online trading include server misconfiguration, social engineering, insider threats, phishing, and malware. Online trading platforms also have vulnerabilities like inadequate authentication measures, poor compliance adherence, and insecure APIs. To ensure your security, adopt good cyber hygiene and use reputable trading sites that adhere to regulatory frameworks and compliance standards.

    • 7 min
    Social Engineering is the Biggest Cyber Threat

    Social Engineering is the Biggest Cyber Threat

    This story was originally published on HackerNoon at: https://hackernoon.com/social-engineering-is-the-biggest-cyber-threat.
    Social engineering is the biggest cyber threat. So why isn't it being taken seriously yet?
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #security, #devops, #security-vulnerability, #ai-trends, #data-breaches, #cybersecurity, #data-security, #social-engineering, and more.


    This story was written by: @evkontsevoy. Learn more about this writer by checking @evkontsevoy's about page,
    and for more stories, please visit hackernoon.com.



    Social engineering is the biggest cyber threat. So why isn't it being taken seriously yet?

    • 7 min

Top Podcasts In Technology

Hacking Humans
N2K Networks
Waveform: The MKBHD Podcast
Vox Media Podcast Network
TechStuff
iHeartPodcasts
Antosh Dyade
Antosh Dyade
Being an Engineer
Aaron Moncur
Lex Fridman Podcast
Lex Fridman

You Might Also Like

The Audit
IT Audit Labs
Security Weekly Podcast Network (Video)
Security Weekly
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Security Now (Audio)
TWiT
The Daily
The New York Times