top of page


Spotting Scam Ads Online
Listen Mode – Audio Version When browsing online, you are bound to come across websites that may seem untrustworthy. Sometimes the site itself looks fine, but the ads or popups feel sketchy. This is extremely common and something every internet user should understand to stay safe. Websites, including this one, often display ads to generate revenue. These ads typically come from advertising networks such as Google or Amazon. However, that does not automatically mean the ads th

Samuel Cork
Feb 222 min read


The 2013 Target Data Breach: How One Email Took Down a Giant
Transcript In 2013 a single overlooked email resulted in a data breach at Target, stealing the data of up to one hundred and ten million customers. A simple attack — targeting not Target itself, but a small heating and air-conditioning company in Pennsylvania. An email so ordinary, nobody thought twice before opening it. Inside that message was malware — silent, patient, and designed to steal. And that single moment would become the doorway to one of the largest retail data b

Samuel Cork
Oct 28, 20254 min read


2017 Equifax Data Breach: How Equifax Let Hackers Walk Away with America’s Identity
Half of America had their identity stolen in 2017, and barely anyone talks about it. Equifax, one of the largest credit reporting agencies in the U.S., was breached by hackers. And this wasn’t just a basic leak. Equifax holds some of the most sensitive data in the country, Social Security numbers, birthdays, driver’s licenses, addresses, everything a hacker needs to steal your identity. In total? 147 million Americans were exposed. That’s nearly half the adult population of t

Samuel Cork
Oct 20, 20252 min read


Privacy Boost for Linux: A Simple Guide to Firejail + Firetools
Audio Version Firetools is an application that uses Firejail to create a sandbox environment. Specifically, Firetools refers to the graphical user interface (GUI), while Firejail operates in the background to manage the sandboxing. A sandbox is a secure environment that isolates applications from accessing other data on your computer. This differs from a virtual machine, which runs an entirely separate Operating System (OS) within your computer. Think of it like a safe room f

Samuel Cork
Jun 6, 20252 min read


Does Incognito Mode Work? Understanding Google Incognito Mode
On Google Chrome, there is a feature called "Incognito Mode". Many users may use this feature to hide browsing history, stop cookies, or...

Samuel Cork
May 30, 20252 min read


Session Hijacking: What is it and How to Prevent It
Session Hijacking (also known as session stealing) is a common attack method used to take over a user's session. Taking over a session...

Samuel Cork
May 23, 20253 min read


Social Media Awareness: Discord Scammers after Tokens
Discord, a popular media platform, uses tokens to allow you to connect and stay connected to your account. This is a session token, and...

Samuel Cork
May 18, 20253 min read


FCC Can Approve IoT Devices With Cyber Trust Mark.
A huge win for the cybersecurity community as well as for the security of all consumers. The FCC now must approve for Internet of Things (IoT) devices to meet security standards with the new Cyber Trust Mark. AI Generated What is the Cyber Trust Mark? The Cyber Trust Mark is a new marking that IoT devices can Voluntarily agree to getting. This marking means that the device was sent to the FCC and inspected to meet high end security qualifications. If the IoT device has a FCC

Samuel Cork
Jan 8, 20252 min read


Password Managers: Why You Need One to Secure Your Privacy
Password managers are a special tool that can either be installed as an app or be integrated with another service. Google chrome has a...

Samuel Cork
Nov 6, 20243 min read


MFA / 2FA: Why You Need IT
Multi-Factor Authentication (MFA) and Two-Factor Authentication (2FA) are necessary security practices that must be implemented to...

Samuel Cork
Nov 2, 20242 min read


Social Media Awareness: Discord Link Embeds to Fake Websites
Discord phishing issue with fake links that may lead to account loss.

Samuel Cork
Oct 27, 20242 min read


Understanding Credential Stuffing: What It Is and How to Protect Your Data
In 2023, a corporation known as 23andMe suffered multiple credential stuffing attacks to their users. 23andMe collects genetic DNA...

Samuel Cork
Sep 25, 20242 min read


Understanding the Basics of Brute Force Attacks: How They Work and What You Need to Know
In cybersecurity, a brute force attack is a technique used to gain unauthorized access to an account through sheer persistence. When...

Samuel Cork
Sep 23, 20243 min read


Account Protection: Create a Secure Password and Secure Your Account
In today's era, it is crucial to ensure the security of all accounts you have created. Having a strong and secure password is essential...

Samuel Cork
Sep 19, 20243 min read


Understanding VPN's: How Do They Help?
A Virtual Private Network (VPN) is used to secure internet traffic. The main goal of a VPN is to safely encrypt internet traffic. This is...

Samuel Cork
Sep 13, 20245 min read


Phishing 101: Spot Scams Before Becoming a Victim
What is Phishing? Phishing is a technique cybercriminals, also known as hackers, use to gain unauthorized access to personal accounts and...

Samuel Cork
Sep 10, 20245 min read


X’s Decision to Lock SMS 2FA Behind a Paywall: A Step Forward or Backward in Security?
X, previously known as Twitter, has made a significant change to one of their account security features. SMS 2FA, a widely used two-factor authentication method, is a common way to secure accounts or profiles, and it has traditionally been provided for free by many websites and applications. However, X has decided to lock this feature behind a paywall, citing that misuse of SMS 2FA was costing the company millions. Users must now subscribe to X’s premium plan to access this c

Samuel Cork
Aug 28, 20242 min read
bottom of page