ipSwitch: 3 ways data is being exposed during the pandemic
Dark Reading: What COVID-19 Teaches Us About Social Engineering
WJBF/ABC: Protecting yourself from Zoom-bombing
DeFrag This: 4 Barriers Impeding Everyone’s Ability To Work From Home
WKBW/ABC: On people cutting the (cable) cord
WKBW/ABC: Student led review bombing attempts at blocking Google Classroom
ipSwitch: How The Dark Triad–Hacking, Trolling, Misinformation–Can Impact Cyber Security During the Pandemic
WKBW/ABC: Zoom story time hack
Raconteur: Could blockchain eliminate payment fraud altogether?
Defrag This: Why cyber hygiene is so important.
WIVB/CBS: Niagara University ransomware attack
Infosecurity Magazine: Do we need more cyber hygiene?
WIVB/CBS: Police use growing platform of personal security for public use
Carnegie Council for Ethics in International Affairs: A new era of cyber warfare.
Washington Post: The Internet is already being weaponized. The U.S. cyberattack on Iran won’t help. The troubling implications of a new form of warfare.
Straits Times, Singapore: The Internet is being weaponised.
Information Age: Top 5 things we know about data theft: Attackers are coming after your information
Verizon Data Breach Investigations Report (DBIR) 2019
RCRWireless News: Hackers want the most bang for their buck, too
WIVb/CBS: Personal safety wearables: Thwarting predators or bringing them closer?
WIVB/CBS: Facebook says bug may have exposed user photos to developers
ABC/WKBW: Police stretched thin responding to multiple bomb threats
BuzzFeed: A massive Marriott data breach affected 500 million customers
CSO Online: The OPM hack explained: Bad security practices meet China’s Captain America
BBC Radio 5: President Trump’s use of a personal, nonsecure cellphone
The Conversation (also appeared in LA Times, Chicago Tribune, and other outlets): Why do so many people fall for fake social media profiles online?
CNN: Spearphishing has become even more dangerous
Infosecurity Magazine: To reward, or not to reward
Social Media and Politics Podcast: Cyber attacks on social media
WIVB: Cybercrime losses exceed $1.4 billion, FBI reports
WBEN: State DMV selling registration info a ‘breach of the public’s trust’
DeFrag This: What we can learn from the Iranian phishing attack
WBEN: Facebook security in for changes
WIVB: Cybersecurity expert weighs in on Facebook
CNN: When a robot writes your news, what happens to democracy
CNN: This op-ed wasn’t written by AI
WIVB: Big and Small Companies on the Radar of Data Hackers
P.I.C.N.I.C Podcast: Has Your Company Turned into a Social Engineering Lab Rat?
Raconteur, London: Protecting elections from cyberattacks
Fortune: Is the new iPhone designed for cyber safety?
LA Times: Is the new iPhone designed for cybersafety?
Newsweek: Iphone 8 and cyber security: How safe is it really?
Psychology Today: The Hardest Word
Salon: Is the new iPhone designed for cybersafety?
Chicago Tribune: Is the new iPhone designed for cybersafety?
Defrag This Podcast wth Greg Mooney: How to Help Users Stop Falling for Phishing Attacks
Chicago Tribune: How this $10 device protects your network from hackers
Dark Reading: Why Most Security Awareness Training Fails (And What To Do About It)
WKBW: Protecting Your Family from Cyber Predators
Las Vegas Review-Journal: When it comes to cybersecurity, employees are weakest link
Kaspersky Lab: Tips to educate your staff on cybersecurity
BrightTALK and ITSP Magazine: Live panel “Power To The People – Knowledge Is Power”
SC Magazine: Diagnosing employee phishing weaknesses key to improving email security
Breach Exchange: Diagnosing employee phishing weaknesses key to improving email security
Attivo Networks: Can’t miss sessions at Blackhat 2017
Mediapro: Three human-focused sessions to attend at Blackhat 2017
WIVB: Keeping your computers safe from cyberattacks
CNN: You are the key to keeping your computer safe
WIVB: New “Snap Map” feature raises privacy concerns on Snapchat
WION: Personal details of nearly 200 million US citizens exposed
WIVB: Travelers beware: Keeping your information safe over Memorial Day Weekend
WKBW: Insight into the problem of ransomware
WKBW: ECMC still recovering from cyberattack
WIVB: Safeguarding America’s nuclear weapons from emerging cyber threats
WBEN AM930: In Focus: Ransomware and the ECMC Computer Virus
WKBW: ECMC computers still down because of computer virus
WIVB: Patient files so far okay after ECMC cyber attack
WION: Putin denies US Poll link
WION: Wikileaks exposes CIA’s spying tools
WKBW: Doll could be spying on your kids
BYU/XM Radio: M att Townsend Radioshow: Campaign Spear Phishing, Why Time Flies, Ruin Relationships
WION: Immigration ban impact on IT sector
WKBW: Staying safe from “virtual kidnapping” scams
WIVB: Your kids could be targets of cyber hacks
WIVB: Gmail users be warned, hackers are targeting your email
CNN Op-Ed: On what President-elect Trump must do to save the Internet
WIVB: The Internet is under attack
La Presse, Canada: Russian Interference in the US Elections
WION (Zee World News): President Obama bids farewell
WION Primetime Gravitas Panel Topic : Radicalization and Social Media Impacts: A night of terror in Berlin, Zurich and Ankara
WION (Zee World News) Primetime Gravitas Panel Topic: Russian hacks and its influence on the U.S. Presidential Elections Aftermath
USA Today: It’s new and it’s bad: Yahoo discloses 1B account breach
BuzzFeed News: 1 Billion More Yahoo Accounts Have Been Hacked
Scientific American: “Spear-Phishing” Roiled the Presidential Campaign—Here’s How to Protect Yourself
Houston Chronicle: How to keep your emails off WikiLeaks: Five ways to frustrate the weasels trying to hack your accounts
WGRZ Channel 2: 5 simple ways to keep your emails from ending up on Wikileaks
Wired Magazine (Issue guest-edited by President Obama): Inside the Cyberattack that Shocked the US Government
WWL AM870/FM105.3: Hackers Shutdown Major Internet Providers
La Presse, Canada: Mysterious motives of Wiki Leaks
The Daily Beast: Democrats Say WikiLeaks Is a Russian Front, U.S. Intelligence Isn’t So Sure
At Buffalo: Gone Phishin’
CNN Op-Ed: Cyber security: It’s not just about Yahoo
Risk Management Magazine: Curb Phishing Damage with a New, Human Approach to Bad Habits
InfoSecurity Magazine: Repel spear phishing by teaching people
How to phish your employees
Fast Company: How WikiLeaks Has Changed: From Whistleblower To Weapon
Politico: Chasing the trail in the DNC hack
WKBW/ABC Channel 7: Who’s watching you?
The Conversation: Cybersecurity’s weakest link: humans
IT security is a people problem, UB cybersecurity expert tells House members
CNN Op-Ed: Why we need a cyber wall
University at Buffalo’s At Buffalo Spring 2016 feature: The Big Idea
WKBW/ABC Channel 7: Expert: school districts at risk for hacking attacks
CNN Op-Ed: Time to rethink apps security
Will you fall for an email scam this tax season?
How to become unphishable
CNN Op-Ed: Is 2016 the year of online extortion?
Politico: Infrastructure Attacks: The way of the future
USA Today: A third of email sent to U.S. House is malware, a virus or spam
CNN Op-Ed: Apple, want to show you really care? Protect us from everyday hacking
Apple vs. FBI could have larger impacts, UB professor says
Cyber attack on LA hospital offers a scary lesson to computer users
CNN Op-Ed: When hackers turn your lights off
Cyber security expert talks spearphising, recent breach
Cyber laws no easy fix in fight against ISIS, local expert says
Cyber hacker attacks kids’ software putting millions at risk
Criminals poised for Cyber Monday
Warning to holiday cyber shoppers: don’t get hacked
Spear phishing” attacks exploit consumers’ email habits
Focusing on user habits key to preventing email phishing
Excellus cyberattack may affect a lot more people than insurer estimates
Cyber breach hits 10 million Excellus healthcare customers
Making the government impenetrable to hackers impossible, experts say
OPM hack raises questions about security of government contractors
Why the cyberattacks keep coming
Senate bill would help thwart hackers, experts say
Russian hacking case shows vulnerability of U.S. networks, UB expert says
World Economic Forum Op-Ed: Who is to blame for cyberattacks?
Fraudulent E-mails Rich with Information Aid Success to Phishing Scams, Finds Study
World Economic Forum Op-Ed: How to fight cybercrime with smarter habits
What makes phishing emails so successful?
Profitable phishing schemes slyly tinker with our heads, then rip us off
University of Buffalo Prof. Arun Vishwanath leads study on phishing scams that prey on fear
THIS IS HOW PHISHING SCAMS TRICK YOU
New e-mail scam preys on parents’ fears
Most Cybercrime Still Relies On Our Laziness
Junk ‘information-rich’ e-mails to avoid fraud
CNN Op-Ed: Where’s the outrage over the Sony hack?
NSF grant funds UB communication research into anti-phishing models
The Scary Way a Friend Request Can Lead to Identity Theft
Habitual Facebook Users More Likely to Be Scammed
In Farcing, Thieves Ask ‘Would You Be My Friend?
Internet users made the heist by Russian hackers a piece of cake
Social media alert: Online phishers are ‘farcing’ your brains out