Blog
Generative AI and Security: Using ChatGPT and Generative AI Models to Improve Security Awareness
Generative AI and Security are increasingly intertwined as organizations face both the benefits and risks associated with tools like ChatGPT. In this post and the following two additional posts, I will explain how ChatGPT (or [...]
Generative AI and Security: The Attacker’s Perspective
In the previous post in this series, I discussed how you can work with generative language models, such as ChatGPT to circumvent ethical constraints and cause them to provide information on various security attack methods. [...]
Create a Strong Password: Strategic Techniques for Unbreakable Security
Passwords are the most commonly used identity verifiers, yet many people struggle with creating ones that are truly secure. In this article, we’ll show you how to create a strong password using a unique nine-rule [...]
Long Passphrases are Better than Complex Passwords and Regular Password Resets are not as Important
While traditional password security guidelines often emphasize the use of strong passwords and frequent resets, these practices may not be as effective as once thought. For years, the security industry has recommended some password character length (ranging from six characters in the early days to 15 or more characters in many modern recommendations) and complexity in the password content (numbers, [...]
Does ChatGPT Impact User Security?
ChatGPT and other artificial intelligence (AI) conversational engines can be used by attackers to develop several attack methods. In this article, I'll focus on just two: social engineering scripts and attack code. Social Engineering Scripts The first simple use of AI engines attackers may exploit is the development of social engineering scripts. Now, if the attacker asks an engine, like [...]
Don’t Overlook the Overlookers
Every day, countless individuals fall victim to a similar form of information theft: shoulder surfing. In this article, we'll unveil the surprising simplicity of this low-tech attack and equip you with three easy steps to protect your sensitive data from prying eyes. Shoulder surfing is a simple method of information theft attackers can use. We will call them the overlookers [...]
The Reality of Weak Passwords
Weak passwords are not defined by specific characteristics alone, such as the number of characters in the password or the types of characters. Characteristics in the context of computing power and capabilities define them. For example, in the 1970s and 1980s, a five—or six-character password would have been very resistant to attack, but today, many systems can crack such a [...]
USB Drop Attacks – What You Should Know
Ransomware is software that installs and activates itself on a computer. Once it's in, it encrypts your files and displays a message. This message informs you that your data is hostage and gives instructions for paying a ransom."A common and subtle attack method is the USB drop. A USB drop attack is just what it sounds like: an attacker places [...]
The “Why” in Security Awareness
Unlocking Security Awareness: The Foundation of Effective Cyber Protection In our Cybersecure course we put significant energy into the “why” behind the “what” of security. The reason for this is simple: we are more likely to take an action (or not take an action) when we know why. A rule without a reason is more often broken. In the book, [...]
Get Certified,
Get the Advantage
Don’t wait until it’s too late. With this Cybersecurity certification, you will have the advantage of being equipped with the necessary skills and knowledge to protect your organization from cyber threats.
Take the first step towards strengthening your cybersecurity acumen by joining AACSP today.