October 17, 2016

Phishing Emails: How to Avoid the Hook When It Looks So Trustworthy

Phishing (pronounced “fishing”) is a term used to describe a certain type of identity theft. Criminals send out emails as bait for unsuspecting consumers designed to resemble popular or trustworthy sites and companies. The goal is to lure the victim into clicking a malicious link or opening an email attachment. […]
October 10, 2016

Thumbdrives: A bring-your-own device that we would rather be left at home!

You’ve seen them; those fun memory stick give-aways that are handed out and won at conferences and workshops. They come in all colors with unique designs, are sometimes branded with company logos, and often have specific data uploaded to them for the programs being presented. But do you know what’s really […]
October 3, 2016

Two-Factor Authentication: Is a six-digit code really safer than my special character password?

The simple answer is, “it can be,” but it isn’t really that simple. First, let’s analyze the “leet”-style password (for more information on leet or leetspeak, take a look at this article from Wikipedia). While this may seem like a fantastic way to obscure a standard password, hackers have been […]
September 19, 2016

Staff Pick: Apply Coding

The staff pick for this blog comes from John Queen, one of NICERC’s Curriculum Development Specialists. This module piqued my interest from the very beginning. HTML is a widely used coding language that is very important to the way we view things, especially on the internet. The Apply Coding module […]