security

identity fraud

How identity fraudsters operate

A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
zero day

Primer: What’s a zero-day?

They’re key to advanced persistent threats. They’re increasingly simple. And they’re called zero-days because there’s essentially no time to patch them before a potential cybercriminal exploit.
APT

Primer: What’s in an APT

“No one is immune” to advanced persistent threats, or APTs, which hackers use to surreptitiously gain access to a network and stay undetected for a long period of time.
Twitter

5 Twitter do’s and don’ts

From verifying link destinations to being cautious about what you share, social-media privacy expert Hayley Kaplan outlines how to safely use President Trump’s favorite pulpit.