Leave a review for our podcast & we'll send you a pack of infosec cards.
Do you keep holiday photos away from social media when you’re on vacation? Security pros advise that it’s one way to reduce your security risk. Yes, the idea of an attacker mapping out a route to steal items from your home sound ambitious. However, we’ve seen actual examples of a phishing attack as well as theft occur.
Alternatively, the panelists point out that this perspective depends on how vulnerable you might be. If attackers need an entry and believe that you’re a worthy target is vastly different from the general noise of regular social media sharers.
Other articles discussed:
- Pseudo ransomware increases
- Companies improve their security because of rise in ransomware
- Seven things startups need to know
- Biometrics: What’s in a face
- What happens when you reply to spam, a TED Talk
- $500,000 for a zero day?
Tool of the week: A Tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic
Panelists: Mike Thompson, Forrest Temple, Mike Buckbee