Cybersecurity / en Biggest Data Breach Ever Spotlights Ongoing Challenges for Users and Cybersecurity Professionals /blog/biggest-data-breach-ever-spotlights-ongoing-challenges-users-and-cybersecurity-professionals Biggest Data Breach Ever Spotlights Ongoing Challenges for Users and Cybersecurity Professionals <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2025-08-14T12:52:23-04:00" title="Thursday, August 14, 2025 - 12:52">August 14, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Major%20Data%20Breach%20Blog%20July%202025.jpg" width="640" alt="DC Studio/AdobeStock" typeof="foaf:Image"> <p>In what cybersecurity experts call the largest data breach in history, more than <a href="https://nypost.com/2025/06/20/tech/16-billion-google-apple-other-passwords-leaked-what-to-know/" target="_blank">16 billion login credentials have been leaked online</a>, exposing passwords for Google, Apple, Facebook, and other major platforms across social media, virtual private networks, and cloud services. This&nbsp;latest large-scale data exposure shows the continuing need for expanded preventative action by both cybersecurity professionals and users themselves to ensure a more cyber-secure future.</p> <figure role="group" class="align-center"> <div alt="DC Studio/AdobeStock" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="ec896510-d37c-42e4-9e13-dc7fb9942ef3" data-langcode="en" title="Cyber Professional. DC Studio. AdobeStock_1413452960" class="embedded-entity"> <img loading="lazy" src="/sites/default/files/Cyber%20Professional.%20DC%20Studio.%20AdobeStock_1413452960.jpg" alt="DC Studio/AdobeStock" title="Cyber Professional. DC Studio. AdobeStock_1413452960" typeof="foaf:Image"> </div> <figcaption>DC Studio/AdobeStock</figcaption> </figure> <p>&nbsp;</p> <p><strong>Mega Breaches: A Growing Trend</strong></p> <p>Major data breaches have been an unfortunate reality since the dawn of the internet. In 2013, <a href="https://cybersecurityventures.com/yahoo-still-ranks-as-the-largest-data-breach-in-history/" target="_blank">Yahoo experienced a previous largest-ever breach</a>, with all 3 billion of its user accounts compromised. The stolen data included names, email addresses, and hashed passwords, and the breach significantly impacted Yahoo鈥檚 valuation during its acquisition by Verizon.</p> <p>More recently, <a href="https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/" target="_blank">Microsoft disclosed a critical breach</a> involving its on-premises Exchange Server software. The 2021 breach allowed attackers to gain full access to email accounts, administrator privileges, and connected devices. The attack affected more than 250,000 servers worldwide, including those of 30,000 U.S. organizations, government agencies, and financial institutions. The breach highlighted the dangers of unpatched legacy systems and the cascading risks posed by compromised enterprise infrastructure.</p> <p>In 2023, a <a href="https://www.revelsi.com/en/blog/15-billion-records-exposed-due-to-misconfigured-database/" target="_blank">breach of the Real Estate Wealth Network exposed 1.5 billion records</a>, including names, addresses, contact information, device details, and sensitive property ownership data. The database also contained internal logs and financial information, including mortgage and tax records for millions of individuals, including celebrities and public figures.</p> <p>This most recent breach involving over 16 billion of Google, Apple, and Facebook passwords is believed to be the <a href="https://www.forbes.com/sites/daveywinder/2025/06/20/16-billion-apple-facebook-google-passwords-leaked---change-yours-now/" target="_blank">result of multiple infostealer campaigns</a>, which involve using malicious software to extract sensitive data from devices and sending it to remote servers controlled by attackers.</p> <p><strong>What Happens to Data after a Breach?</strong></p> <p>Once credentials are leaked, <a href="https://www.itgovernance.eu/blog/en/the-6-most-common-ways-data-breaches-occur" target="_blank">they often end up on dark web marketplaces</a>, where they鈥檙e sold in bulk to cybercriminals. These actors use the data in credential stuffing attacks, where automated bots attempt to log into various services using the same username and password combinations. If users have reused passwords across platforms, attackers can gain access to multiple accounts with minimal effort.</p> <p>Beyond account takeovers, <a href="https://www.proofpoint.com/us/threat-reference/data-leak" target="_blank">leaked data is used to craft highly targeted phishing campaigns</a>. With access to personal details, attackers can impersonate trusted services and trick users into revealing even more sensitive information. In more severe cases, stolen data is used for identity theft, enabling criminals to open bank accounts, apply for loans, or file fraudulent tax returns in the victim鈥檚 name. Exposed data can be reused, repackaged, and exploited for years, causing long-term reputational damage, financial loss, and emotional stress.</p> <p><strong>How to Protect Yourself if Your Data is Breached</strong></p> <p>If you suspect your credentials may have been compromised, it鈥檚 critical to act quickly. Start by changing your passwords, especially for high-value accounts like email, banking, and cloud storage. <a href="https://www.experian.com/blogs/ask-experian/data-breach-five-things-to-do-after-your-information-has-been-stolen/" target="_blank">Avoid reusing passwords across platforms</a> and consider using a password manager to generate and store strong, unique passwords.</p> <p>Enabling multi-factor authentication can add an extra layer of protection by requiring a second form of verification, such as a fingerprint or one-time code. You should also monitor your accounts for unusual activity by enabling login alerts and account activity logs and consider identity theft monitoring services that can alert you if your personal information appears on the dark web.</p> <p><strong>How to Prevent Major Data Breaches</strong></p> <p>Massive breaches are often the result of systemic weaknesses in cybersecurity infrastructure. Many organizations still <a href="https://corporatefinanceinstitute.com/resources/data-science/data-breach/" target="_blank">rely on outdated systems, fail to patch known vulnerabilities, or lack proper encryption protocols</a>. In some cases, sensitive data is stored without adequate access controls, making it easier for attackers to infiltrate and extract information.</p> <p>Human error also plays a major role. Employees may fall for phishing scams, use weak passwords, or misconfigure cloud storage settings. Meanwhile, the sheer volume of digital data being generated and its storage in increasingly complex environments creates an ever-expanding attack surface.</p> <p>Compounding the issue is the fact that, until a breach occurs, cybersecurity is often treated as a secondary concern. One study found that <a href="https://www.pwc.com/gx/en/news-room/press-releases/2024/pwc-2025-global-digital-trust-insights.html" target="_blank">only 2% of organizations have implemented a comprehensive cyber resilience strategy</a>. Without proactive investment and offensive vs. defensive cyber engineering in security architecture, staff training, and incident response planning, organizations remain vulnerable to both sophisticated and opportunistic attacks.</p> <p>The leak of 16 billion passwords is a blunt reminder that the scale and sophistication of cyberattacks continues to grow. As attackers become more capable鈥攊n part by leveraging artificial intelligence鈥攖o create more efficient attack methods, cyber professionals must enhance their skills and stay current with evolving technologies to stay one step ahead.</p> <p><strong>Cybersecurity Education at Capitol Tech</strong></p> <p>Capitol Technology University is recognized by the National Security Agency (NSA) and Department of Defense (DoD) as a Center of Academic Excellence in Cyber Defense (CAE-CD). Our award-winning programs in鈥?lt;a href="/fields-of-study/cyber-and-information-security" target="_blank">cyber and Information security</a>鈥痗an prepare you to create a safer and more secure digital world. With resources such as our鈥?lt;a href="/student-experience/centers-and-labs/cyber-lab" target="_blank">Cyber Lab</a>鈥痑nd鈥?lt;a href="/student-experience/centers-and-labs/critical-infrastructure-center-cic" target="_blank">Critical Infrastructure Center</a>鈥?CIC), as well as our expert faculty and partnerships with leading cyber agencies, Capitol Tech empowers graduates to succeed in this diverse and expanding field.</p> <h3>Explore what a degree from Capitol Tech can do for you! To learn more,鈥?lt;a href="https://javascript:void(0);/" target="_blank">contact our Admissions team</a>鈥痮r鈥?lt;a href="/request-information" target="_blank">request more information</a>.</h3> <p lang="EN-US">&nbsp;</p> <p lang="EN-US"><em>Written by Jordan Ford</em></p> <p lang="EN-US"><em>Edited by Erica Decker</em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/taxonomy/term/41" hreflang="en">Critical Infrastructure</a> <section id="section-51506" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 14 Aug 2025 16:52:23 +0000 emdecker 13111 at Space, Cybersecurity, and AI:聽Trends to Watch in 2025 and Beyond /blog/space-cybersecurity-and-ai-trends-watch-2025-and-beyond Space, Cybersecurity, and AI:&nbsp;Trends to Watch in 2025 and Beyond <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2025-08-13T09:47:19-04:00" title="Wednesday, August 13, 2025 - 09:47">August 13, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Space%2C%20Cyber%2C%20AI.%20NicoElNino.%20AdobeStock_475286193.jpg" width="640" alt="Space, Cyber, AI. NicoElNino. AdobeStock" typeof="foaf:Image"> <p>As commercial space and AI-powered technology continue to expand, so does the potential for opportunistic cyberattacks. From satellites and ground stations to data links and control systems, every layer of space-Earth infrastructure faces vulnerability. This convergence of space, cybersecurity, and AI is set to challenge and reshape how we think about national security, critical infrastructure, and global cooperation.&nbsp;</p> <figure role="group"> <div alt="Space, Cyber, AI. NicoElNino. AdobeStock." data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="6e6e3046-86d7-4862-bbfd-761527540d09" data-langcode="en" title="Space, Cyber, AI. NicoElNino. AdobeStock" class="embedded-entity"> <img loading="lazy" src="/sites/default/files/AdobeStock_475286193.jpg" alt="Space, Cyber, AI. NicoElNino. AdobeStock." title="Space, Cyber, AI. NicoElNino. AdobeStock" typeof="foaf:Image"> </div> <figcaption>NicoElNino/AdobeStock</figcaption> </figure> <p>&nbsp;</p> <p><strong>How Do Space, Cybersecurity, and AI Work Together?</strong></p> <p>The <a href="https://cyberscoop.com/viasat-ka-sat-hack-black-hat/" target="_blank">2022 cyberattack on Viasat</a>, which disrupted Ukrainian communications just before Russia鈥檚 invasion, was a wake-up call for the global space community. It demonstrated how space and cyber warfare can no longer be considered separate domains. Satellites rely on terrestrial networks for command and control, making them vulnerable to both physical and digital threats. A single breach in a ground station or uplink can compromise an entire satellite constellation, affecting GPS, communications, and even military operations.&nbsp;</p> <p>The growing use of commercial satellites for defense and intelligence purposes has also blurred lines between civilian and military targets, making commercial space assets more attractive targets for state-sponsored cyber actors. As more countries and private companies launch satellites, the attack surface expands exponentially. The U.S. Department of Defense has acknowledged that commercial <a href="https://lieber.westpoint.edu/us-department-defense-space-force-commercial-space-strategies/" target="_blank">space systems must now be considered part of the broader military cyber battlefield</a>, requiring integrated defense strategies that span both domains.&nbsp;</p> <p>This interdependence has led to an expansion in policy initiatives. The <a href="https://www.solarium.gov/" target="_blank">U.S. Cyberspace Solarium Commission 2.0</a> has called for stronger protections for space systems, including cloud security certifications, public-private collaboration, and the creation of a Bureau of Cyber Statistics. With <a href="https://nanoavionics.com/blog/how-many-satellites-are-in-space/" target="_blank">nearly 12,000 active satellites already in orbit</a> and more on the way, the urgent need for standards and governance is clear.&nbsp;</p> <p><strong>AI and Machine Learning in Space Cybersecurity</strong></p> <p>Space agencies and tech companies are increasingly turning to AI and machine learning technologies to <a href="https://www.uscybersecurity.net/csmag/on-the-horizon-top-five-security-trends-for-2025-in-space-cyber/" target="_blank">detect anomalies, predict threats, and even autonomously respond to cyber intrusions</a> in real-time, integrating these tools into every segment, from user to ground to link and orbit.&nbsp;</p> <p>The Aerospace Corporation has been at the forefront of the space-cyber-AI evolution through their development of <a href="https://aerospace.org/article/cybersecurity-orbit-how-aerospace-evolving-defenses-against-emerging-space-threats" target="_blank">onboard intrusion detection systems like 鈥淪paceCOP鈥?lt;/a> that can identify suspicious activity in real-time. These innovations are part of a broader shift toward end-to-end threat awareness, where cybersecurity is embedded across the entire lifecycle and operation of assets. The goal is not just to prevent attacks, but to build cyber survivability and resilience into core functions at every level.&nbsp;</p> <p><strong>Challenges and Growing Pains</strong></p> <p>Despite the progress and expansion of available tools and technologies, significant challenges remain. Many space systems are built on legacy hardware and software that were never designed with cybersecurity or AI in mind. The long development cycles of space missions often means that by the time a system is launched, its cybersecurity protocols may already be outdated. <a href="https://www.burohappold.com/insights/cybersecurity-in-retrofit-balancing-risk-heritage-and-resilience/" target="_blank">Retrofitting systems is costly and complex</a>, especially for those already in orbit. &nbsp;</p> <p><a href="https://orfamerica.org/newresearch/background-cyber-whodunit" target="_blank">Identifying the source of cyberattacks in space is also incredibly difficult</a> because of the global nature of satellite communications, the lack of standardized international cybersecurity protocols for space, and the use of anonymizing technologies. This can also be further complicated by diplomatic concerns that raise the risk of escalation on top of the effects of the attack itself.&nbsp;</p> <p>To address these issues, experts are calling for <a href="https://www.csis.org/analysis/space-and-cyber-warfare-one" target="_blank">collaborative cyber defense frameworks</a>. These would include global standards, real-time information sharing, and coordinated incident response across nations and industries. Public-private partnerships will be essential, as will the development of agile, updatable systems that can adapt to evolving threats.鈥?amp;nbsp;</p> <p>This shift is also driving a significant demand for professionals with the skills ready to meet these new challenges by gaining certifications and&nbsp;that blend the cutting edge of aerospace engineering, cybersecurity, and AI.&nbsp;</p> <p><strong>Bringing Space, Cyber, and AI Together at Capitol Tech</strong></p> <p>The convergence of space, cybersecurity, and AI presents both unprecedented challenges and powerful opportunities. Capitol Technology university鈥檚 <a href="/fields-of-study/cyber-and-information-security" target="_blank">cybersecurity</a>, <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science" target="_blank">AI</a>, and <a href="/fields-of-study/aviation-and-astronautical-engineering" target="_blank">space programs</a> can equip you with the skills needed to ensure that the final frontier remains a safe and secure domain for innovation, exploration, and global connectivity. You are also invited to attend <a href="www.greycon.org">GreyCon</a>, Capitol Tech鈥檚 inaugural professional conference exploring the intersection of these emerging fields.&nbsp;</p> <h3>To learn more,鈥?lt;a href="https://javascript:void(0);/" target="_blank">contact our Admissions team</a>鈥痮r鈥?lt;a href="/request-information" target="_blank">request more information</a>.&nbsp;</h3> <p lang="EN-US">&nbsp;</p> <p lang="EN-US"><em>Written by Jordan Ford</em></p> <p lang="EN-US"><em>Edited by Erica Decker</em></p> <hr> <h3>Join Us for GreyCon 2025!</h3> <p>Interested in exploring the intersection of space, AI, and cybersecurity? We invite you to join us for our professional tech conference on Friday, October 10, 2025!</p> <p><strong>Visit <a href="www.greycon.org">www.greycon.org</a> for more information.</strong></p> <div alt="Greycon 2025 Logo" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="e70d59d4-5f07-4533-a953-6232da2699a9" data-langcode="en" title="Greycon 2025 Logo" class="align-center embedded-entity"> <img loading="lazy" src="/sites/default/files/Greycon%202025%20Logo.jpg" alt="Greycon 2025 Logo" title="Greycon 2025 Logo" typeof="foaf:Image"> </div> Categories: <a href="/blog/category/astronautical-engineering" hreflang="en">Astronautical Engineering</a>, <a href="/blog/category/artificial-intelligence" hreflang="en">Artificial Intelligence</a>, <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> Wed, 13 Aug 2025 13:47:19 +0000 emdecker 13106 at How Cybersecurity Professionals Are Fighting聽 REAL ID Scams /blog/how-cybersecurity-professionals-are-fighting-real-id-scams How Cybersecurity Professionals Are Fighting&nbsp; REAL ID Scams <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-07-25T10:52:29-04:00" title="Friday, July 25, 2025 - 10:52">July 25, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/how%20cybersecurity%20professionals%20are%20fighting%20real%20id%20scams.jpg" width="4160" alt="people waiting at DMV for real ID" typeof="foaf:Image"> <p>How has a 20-year-old U.S. law about state ID cards led to phishing opportunities for digital scammers? Cybersecurity experts tracking phishing scams say that fraudsters are targeting individuals who need compliant IDs and urge the public to beware.</p> <p><strong>What is REAL ID?</strong></p> <p>The REAL ID Act, passed in 2005, was designed to enhance national security by setting stricter standards for state-issued IDs. As of&nbsp;2025, licenses and ID cards that do not meet the <a href="https://www.usa.gov/real-id">REAL ID standard</a> are no longer acceptable forms of identification to board domestic flights or access certain federal facilities. REAL IDs, while they maintain the same general appearance of a standard driver鈥檚 license, feature a unique marking in the top right corner of the card and have enhanced security aspects like holograms, barcodes, and other anti-fraud measures to prevent counterfeiting. REAL IDs can only be obtained in-person at a state driver鈥檚 licensing agency with required documentation, typically proof of identity, social security number, and residency.</p> <p><strong>What Do REAL ID Scams Look Like?</strong></p> <p>As the deadline neared for REAL ID compliance, scammers seized the opportunity to exploit public confusion and urgency. <a href="https://cybernews.com/security/real-id-survellance-weapon-hacker-target-biometric-technology/">Cybersecurity experts reported a surge in phishing scams</a> targeting individuals seeking REAL IDs.</p> <p>The initial deadline has now passed, but <a href="https://www.newsweek.com/americans-scramble-real-id-appointments-2057279">millions of Americans still don鈥檛 have a REAL ID</a>, leaving the door open for continued scam efforts, which typically fall into a few categories:</p> <ul> <li>Phishing emails and texts: These messages <a href="/blog/top-cyber-scams-watch-out-2024">appear to come from official sources</a> and often include urgent language like 鈥淎ction Required鈥?or 鈥淵our REAL ID is at risk.鈥?amp;nbsp;</li> <li>Fake websites: Some scammers create entire websites that look like legitimate government pages. These sites may <a href="https://www.aarp.org/money/scams-fraud/avoid-real-id-scams/?msockid=3b9d12b3203a618b2a590718219d60aa">ask users to enter personal information or upload documents</a>, which are then harvested for identity theft.</li> <li>Phone scams: In some cases, fraudsters call victims pretending to be government representatives, asking for verification of personal details under the guise of processing a REAL ID application.</li> </ul> <p>These scams are especially effective because they exploit trust in government institutions and capitalize on both a lack of familiarity with the REAL ID process and a sense of urgency caused by the deadline. These factors are compounded with threats of penalties and fines if they aren鈥檛 compliant.</p> <p>鈥淲e know any time people are up against a deadline, they will try to find an expedited way to get the process done. And that鈥檚 when the scams pop up.鈥?鈥擜my Nofziger, Director of Victim Support, AARP Fraud Watch Network&nbsp;</p> <p><strong>How to Avoid Getting Scammed</strong></p> <p>Cybersecurity professionals and consumer protection agencies continue to recommend several steps to avoid becoming a victim.</p> <ul> <li>Remember that <a href="https://consumer.ftc.gov/consumer-alerts/2025/06/yes-going-dmv-only-way-avoid-real-id-scam">REAL IDs must be obtained in person</a>. There is no online application or expedited service. If someone offers to help you get a REAL ID online, it鈥檚 a scam.</li> <li>Avoid clicking on links in unsolicited emails or texts. If you receive a message about your REAL ID, verify it by contacting your DMV directly using a trusted phone number or website, or in-person.</li> <li>If you receive a suspicious message, report it to the FTC at ReportFraud.ftc.gov. You can also forward scam texts to 7726 (SPAM) and report phishing emails to your provider.</li> </ul> <p><strong>How Cybersecurity Experts Fight Back</strong></p> <p><a href="https://www.guidepointsecurity.com/newsroom/real-id-scams-what-to-look-out-for/">Cybersecurity companies like GuidePoint Security</a> use a combination of threat intelligence, machine learning, and human analysis to track and neutralize these scams. Their teams monitor phishing campaigns in real time, identifying patterns in domain registrations, email headers, and malware payloads. Once a scam is identified, they work with ISPs and law enforcement to shut down malicious sites and trace the source of the attacks.</p> <p>Microsoft Defender software <a href="https://learn.microsoft.com/en-us/defender-endpoint/malware/phishing">uses AI to detect phishing attempts by analyzing email metadata, link behavior, and sender reputation</a>. Organizations can also configure anti-phishing policies to block suspicious messages before they reach users.</p> <p>REAL ID scams are part of a broader trend in cybercrime. According to the FBI, <a href="https://www.fbi.gov/contact-us/field-offices/tampa/news/older-americans-lose-billions-to-fraudsters">Americans over 60 lost more than&nbsp;$3.4 billion&nbsp;to scams in 2023</a>, a figure that continues to rise as fraudsters adopt more sophisticated tactics. With the rise of AI-generated content and deepfakes, impersonation scams are becoming harder to detect and more convincing than ever, highlighting the important and always-growing role well-trained and innovative cybersecurity professionals play in keeping our information and systems safe.</p> <p><strong>Cybersecurity Education at Capitol Tech</strong></p> <p>Capitol Technology University is proudly designated as a National Center of Academic Excellence in Cyber Defense (NCAE-CD) by the NSA and DHS. Our&nbsp;<a href="/fields-of-study/cyber-and-information-security">cybersecurity programs</a>, cutting-edge laboratories, expert faculty, public- and private-sector partnerships, and engaged network of alumni prepare students at all career levels to protect people and systems from real-world cyberattacks in our evolving, cyber-focused world.</p> <p>To learn more,&nbsp;<a href="mailto:admissions@captech.edu">contact our Admissions team</a>&nbsp;or&nbsp;<a href="/request-information">request more information</a>.</p> <p>&nbsp;</p> <p><em>Written by Jordan Ford</em></p> <p><em>Edited by Erica Decker</em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51346" class="section background-white"> <div class="super-contained"> </div> </section> Fri, 25 Jul 2025 14:52:29 +0000 zqureshi 13081 at Mitigating Cybersecurity Threats and Preparing for a Quantum-Driven Landscape /blog/mitigating-quantum-computing-threats-to-cybersecurity Mitigating Cybersecurity Threats and Preparing for a Quantum-Driven Landscape <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-06-23T12:08:27-04:00" title="Monday, June 23, 2025 - 12:08">June 23, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Quantum%20computing%20threats%20to%20cybersecurity_2.jpeg" width="640" alt="man working on computer screen showing how quantum computing affects cybersecurity" typeof="foaf:Image"> <p><span><span><span><span><span><span>Our digital lives are built on the promise of protected secrets. Every online transaction, personal file, and secure communication depends on complex encryption algorithms to keep that data safe from unintended exposure. For decades, the classic cryptographic algorithms known as Rivest鈥揝hamir鈥揂dleman (RSA), Digital signature algorithm (DSA), and Elliptic curve cryptography (ECC) have served as the <a href="https://www.sectigo.com/resource-library/rsa-vs-dsa-vs-ecc-encryption">most common and useful digital guards</a> protecting our private assets. However, the emergence of quantum computing is introducing new challenges to how we keep information safe and demands a reevaluation of how cybersecurity professionals are approaching the quantum future.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Threats to Cybersecurity and Current Encryption Methods</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Leveraging the principles of quantum mechanics, quantum computers possess the potential to solve computational problems exponentially faster than traditional computers. This capability poses a direct threat to many of our current encryption methods. The implications are far-reaching as vast amounts of secured personal, financial, governmental, and industrial data could become vulnerable to decryption in a matter of moments.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>&nbsp;A recent study by Forrester suggested that <a href="https://www.ey.com/en_gr/insights/innovation/why-organizations-should-prepare-for-quantum-computing-cybersecurity-now">all current cryptosystems could be hacked by quantum computers in as few as the next five years</a>. And the financial and operational costs of successful attacks are expected to rise.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Concern within the technology community is growing, with 95% of software developers expressing worry regarding the security implications of quantum computing and cybersecurity experts warning about potential exploits. British accounting firm EY reported that malicious actors may already be engaged in a "<a href="https://www.ey.com/en_au/insights/cybersecurity/improving-tomorrow-s-security-by-decoding-the-quantum-computing-threat">harvest now, decrypt later</a>" strategy鈥攇athering encrypted data to be exploited later as quantum decryption capabilities become more sophisticated.</span></span></span></span></span></span></p> <h3><span><span><span><span><em><span>鈥淭he last decade has witnessed not just advancements in quantum hardware but</span></em></span></span></span></span><span><span><span><span><span><span> </span></span></span></span></span></span><span><span><span><span><em><span>&nbsp;also significant progress in quantum algorithms aimed at breaching cryptographic protocols. Additionally, considering the time value of data鈥攖he idea that security protocols must protect information throughout its entire lifecycle鈥攅mphasizes the urgency of transitioning to quantum-safe solutions.鈥?lt;/span></em></span></span></span></span></h3> <p><span><span><span><span><span><span>鈥擜aron Perryman, EY Asia-Pacific Financial Services Consulting and Digital Leader, Charles Lim, JPMorgan Chase, Global Head of Quantum Communications and Cryptography, and Kaushik Chakraborty, JPMorgan Chase, Applied Research Lead in Quantum Communications</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Many organizations have been slow to adapt due to the complexity of the technology and the requirement for overwhelming infrastructure changes. Companies will also need people on IT and security teams who are well-educated in the intersecting fields of quantum computing and cybersecurity to strengthen key management practices, enhance network segmentation, and improve intrusion detection systems. As quantum computing may eventually enable more advanced attack vectors beyond decryption, such as faster brute-force or machine-learning exploits, companies must prepare now with both technology and trained personnel.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>A Quantum-Resistant Approach</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>One promising and innovative approach to quantum cyber threats involves <a href="https://www.coevolve.com/insights-striking-a-balance-centralized-vs-decentralized-security-in-enterprises/">decentralized security networks</a>. Unlike traditional centralized security systems that rely on only one central point of control, decentralized security networks distribute security responsibilities and data across a network of independent nodes or participants. This distributed architecture enhances resilience by eliminating single points of failure, increases transparency through distributed validation processes, and supports the development of novel security mechanisms that are inherently more resistant to quantum attacks.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The concept of Decentralized Physical Infrastructure Networks (DePIN) exemplifies this approach by leveraging blockchain technology and cryptographic principles to create secure and resilient physical infrastructure networks. The belief in DePIN's potential to address quantum threats is significant, with <a href="https://www.ulam.io/blog/how-depin-is-revolutionizing-infrastructure-in-the-web3-era">87% of respondents in a Naoris Protocol survey expressing confidence in its pivotal role over the next decade</a>.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Innovation at the Intersection of Quantum and Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>While the quantum computing revolution presents a clear threat to cybersecurity, it also unlocks unprecedented opportunities within computer science and related disciplines. Quantum computers can accelerate breakthroughs in <a href="/blog/how-ai-and-quantum-computing-are-transforming-drug-discovery-and-healthcare-industry">drug discovery through advanced molecular simulations</a>, <a href="/blog/how-quantum-computing-is-revolutionizing-financial-industry">financial analysis and asset management</a>, and the development of more sophisticated artificial intelligence and machine learning algorithms. Quantum computing itself can also contribute to the next generation of cybersecurity tools, including quantum key distribution and quantum-resistant cryptography.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Cybersecurity can help protect against the growing challenges posed by the integration of quantum computing primarily through developing and implementing post-quantum cryptography (PQC). These new algorithms are designed to be secure by not relying on mathematical problems that quantum computers can easily solve (like factoring large primes), but instead using problems believed to be hard even for quantum machines, such as lattice-based or code-based cryptography.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Another layer of protection comes from hybrid cryptographic systems, which combine classical and post-quantum algorithms to ensure compatibility with existing systems while preparing for future threats. This transitional approach allows organizations to test and implement PQC gradually, which can alleviate concerns about the immediacy of the finances and manpower needed to perform an infrastructure overhaul.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Cybersecurity policies must also evolve to include quantum risk assessments, supply chain audits, and international collaboration to align defenses with emerging standards. By taking proactive, multi-layered approaches, cybersecurity can stay resilient in the face of quantum-powered threats and reduce the burden of adoption over time.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Quantum Computing at Capitol Tech</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Addressing the nature of quantum computing to serve as both a threat and a solution requires a dedicated force of skilled professionals. The demand for experts proficient in quantum computing principles, post-quantum cryptography, and decentralized security architectures is rapidly increasing. Continuous education, collaborating across industries, and supporting the development of post-quantum standards are going to be essential to ensure a secure digital future.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Capitol Technology University offers programs in <a href="/fields-of-study/cyber-and-information-security">Cybersecurity</a> and <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science">Computer Science</a> that prepare graduates to meet this demand, fostering the expertise necessary to mitigate the risks posed by quantum-powered cyberattacks and leveraging the transformative power of technology for innovation and security.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Explore what a degree from Capitol Tech can do for you! To learn more, <a href="mailto:admissions@captech.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> <p><em><span><span><span><span><span><span>Written by Jordan Ford</span></span></span></span></span></span></em></p> <p><em><span><span><span><span><span><span>Edited by Erica Decker</span></span></span></span></span></span></em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51131" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 23 Jun 2025 16:08:27 +0000 zqureshi 13016 at How Cybersecurity is Addressing the Rising Threat of Online Romance Scams /blog/how-cybersecurity-is-addressing-the-rising-threat-of-online-romance-scams How Cybersecurity is Addressing the Rising Threat of Online Romance Scams <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-05-15T13:54:00-04:00" title="Thursday, May 15, 2025 - 13:54">May 15, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/how-cybersecurity-is-addressing-rising-threat-of-online-romance-scams.jpg" width="7392" alt="scammer in red hoodie working on laptop" typeof="foaf:Image"> <p><span><span><span><span><span><span>Searching for friendships and relationships online has continued to grow in popularity, with an all-time high of <a href="https://www.breakthecycle.org/how-many-people-use-dating-apps/">381 million people using dating apps in 2024</a>. The convenience of dating apps, social media messaging, gaming platform chat, and other digital tools makes it easy to form connections with people both locally and globally. While these platforms provide a user-friendly forum for socializing, they also pose a risk as scammers can hide in plain sight and exploit users鈥?good intentions.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Romance and Friendship Scams in Cyberspace</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>According to the Federal Trade Commission (FTC), more than <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/shared/4WS8HTYQ6">65,000 victims lost a staggering $1.18 billion to romance scams</a> in 2023. These scams commonly start through matching on dating apps or unexpected private direct messages (DMs) on social media. Once contact is established, scammers can craft intricate lies, using stolen photos or data and believable details to make their fake profiles incredibly convincing. <a href="https://about.fb.com/news/2025/02/how-avoid-romance-scams-this-valentines-day/">Many fraudsters pose as celebrities, military personnel, or successful businesspersons</a> to reel in their targets.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The psychology behind the success of a relationship scam lies in a victim鈥檚 emotional vulnerability. Scammers create a sense of urgency, trust, and emotional dependency, often <a href="https://www.scamwatch.gov.au/types-of-scams/online-dating-and-romance-scams#:~:text=They%20'lovebomb'%20you%2C%20messaging,%2C%20WeChat%2C%20Line%20or%20WhatsApp.">by showering victims with excessive affection and attention early on</a>. This manipulation鈥攌nown as 鈥渓ove bombing鈥濃€攍owers defenses, making victims feel more trusting and likely to comply with requests.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Scammers then exploit victims鈥?affection for financial gain. Payment methods like cryptocurrency and bank wires are particularly popular, <a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2023/02/romance-scammers-favorite-lies-exposed">accounting for over 60% of reported losses in these scams</a>. Additionally, gift cards are frequently requested, as they鈥檙e harder to trace and easier to liquidate, as well as asking for help with emergency financial situations.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>"Unlike traditional scams, [these scammers] rarely ask for money outright; instead, they manipulate victims into offering financial help through fabricated medical emergencies, legal crises, or investment opportunities."鈥?lt;a href="https://www.financemagnates.com/forex/regulation/looking-for-valentines-love-dont-be-part-of-the-4-billion-romance-scam/">Jonathan Frost, Director, Global Advisory at BioCatch</a></span></em></span></span></span></span></p> <p><span><span><span><strong><span><span>The Growing Role of Deepfakes and AI</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The emergence of new technologies has made relationship scams more sophisticated and harder to detect. <a href="https://www.mcafee.com/ai/news/how-romance-scammers-are-using-deepfakes-to-swindle-victims/">Scammers can now use AI and deepfake technology</a> to create realistic images, videos, text messages, email communications, and voice recordings, making their fake identities appear more authentic. Victims may believe they are speaking to a real person, only to discover later that the entire interaction was digitally created.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The accessibility of these technologies has made it easy for even amateur scammers to create successful high-level deceptions. This scalability also means that fraudsters can target multiple victims simultaneously, increasing the reach and impact of their schemes.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Identifying and Avoiding Romance Scams</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>To combat relationship scams, the Commodity Futures Trading Commission recently launched the <a href="https://www.cftc.gov/PressRoom/PressReleases/9052-25">鈥淒ating or Defrauding?鈥?campaign</a>. The campaign focuses on educating the public about recognizing red flags and taking proactive measures to avoid falling victim to online romance scams. The <a href="https://www.newsweek.com/fbi-warns-sinister-romance-scams-2028993">FBI also released a warning</a> to highlight the rising prevalence and dangers of these scams.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Often with cybersecurity concerns, <a href="https://www.ftc.gov/business-guidance/blog/2024/02/love-stinks-when-scammer-involved">human factors play a critical role</a>, where the weak point is the untrained eye of an unsuspecting victim. Here are a few ways users can spot relationship scammers and protect themselves.</span></span></span></span></span></span></p> <ul> <li><span><span><span><strong><span><span>Verify before you trust.</span></span></strong></span></span></span><span><span><span><span><span><span> Never rush into sharing personal information or giving away money鈥攅specially cryptocurrency鈥攐nline, even with someone who seems trustworthy. If a&nbsp; stranger asks you for money, consider it a scam and stop communicating with them. If you think it is someone you know, like a relative or co-worker, call that person on the phone to verify it is them. Often, personal accounts can be hacked, and scammers will pose as that person, sending DMs to all their contacts for financial help.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Be cautious of over-affection. </span></span></strong></span></span></span><span><span><span><span><span><span>Scammers often use intense displays of affection to build quick trust. Proceed with caution if someone鈥檚 attention feels overwhelming or too good to be true.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Look for inconsistencies.</span></span></strong></span></span></span><span><span><span><span><span><span> Fake profiles often have inconsistencies in their stories or images. Reverse image searches can help identify stolen photos.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Report fake accounts. </span></span></strong></span></span></span><span><span><span><span><span><span>Most social media and dating platforms provide ways to report accounts, or to share the scammer鈥檚 information within a group or forum to warn others, or even reported to law enforcement.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Secure your accounts.</span></span></strong></span></span></span><span><span><span><span><span><span> Use strong passwords that you update regularly and avoid sharing sensitive information through online platforms. Learning and exercising personal cybersecurity tactics and using common sense can be your first line of defense to avoiding relationship scams.</span></span></span></span></span></span></li> </ul> <p><span><span><span><strong><span><span>How the Cyber Industry is Fighting Online Romance Scams</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The cybersecurity industry utilizes several tactics to detect and prevent the rising threat of online relationship scams. AI and machine-learning models can be used to monitor platforms for suspicious behaviors such as repeated messaging patterns, rapid relationship escalation, and inconsistencies in user profiles. Image-recognition tools can help identify AI-generated, stolen, or reused photos, while natural language processing (NLP) systems are trained to pick up on common scammer dialogue or psychological manipulation tactics. These tools can flag potential spam accounts for human moderators to investigate, or even shut them down automatically, depending on the platform鈥檚 protocols.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The popular dating app Bumble recently <a href="https://bumble.com/en/the-buzz/bumble-deception-detector">announced their new AI-powered tool called the Deception Detector鈩?lt;/a>, which was developed to better address fake, spam, or scam profiles. During testing, this software supported blocking 95% of these types of accounts automatically with improved accuracy. Another dating app, Hinge, states they 鈥?lt;a href="https://hinge.co/trustandsafety">use a combination of machine-learning-driven technology and content moderators</a> to maintain the safety and integrity of the Hinge experience.鈥?Facebook has been using AI, machine learning, and hand-coded tools for several years to help remove fake accounts. In 2019, <a href="https://screenrant.com/how-facebook-ai-removes-fake-accounts/">they reported more than 6 billion fake accounts were removed</a>, and that number continues to grow.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>In addition to technical solutions, the fields of cyberpsychology and <a href="https://globalcybersecuritynetwork.com/blog/product-managers-cybersecurity-role/">cyber product management are playing an increasingly important role </a>in understanding how scammers manipulate emotions and exploit systems. Certain branches of cyberpsychology as well as product management involve experts who collaborate with cybersecurity teams to identify and map the tactics commonly used by scammers鈥攍ike 鈥渓ove bombing,鈥?mirroring, and urgent crisis scenarios鈥攁nd help in the product design of systems that can detect these behavioral red flags. This interdisciplinary approach demonstrates the industry鈥檚 work toward building increasingly resilient and trustworthy online platforms, where people can connect without falling prey to digital deception.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Cybersecurity Education at Capitol Tech</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The growing threat of online relationship scams underscores the urgent need for education and skills development in cybersecurity.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Capitol Technology University is proudly designated as a National Center of Academic Excellence in Cyber Defense by the NSA and DHS. Our <a href="/fields-of-study/cyber-and-information-security">Cybersecurity programs</a> prepare you for real-world cyberattacks and help you develop innovative defense strategies in our evolving, cyber-focused world.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more,&nbsp;<a href="mailto:admissions@captech.edu">contact our Admissions team</a>&nbsp;or&nbsp;<a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51071" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 15 May 2025 17:54:00 +0000 zqureshi 12956 at Cybersecurity in the Age of IoT: Protecting Our Interconnected World /blog/cybersecurity-age-of-iot-protecting-our-interconnected-world Cybersecurity in the Age of IoT: Protecting Our Interconnected World <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2025-05-07T09:38:43-04:00" title="Wednesday, May 7, 2025 - 09:38">May 7, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/March%20Blog%20-%20IoT%20Cybersecurity%20.jpg" width="640" alt="March 2025 Blog - IoT Cybersecurity" typeof="foaf:Image"> <p>The Internet of Things (IoT) provides internet connectivity for an incredible variety of devices, from cell phones, computers, smart homes, and classrooms to industrial machines, autonomous vehicles, and more. By connecting and sharing data over the internet, IoT offers more than just convenience鈥攊t provides information at lightning speed, vastly expanding knowledge-sharing, process automation, remote monitoring, and real-time data analysis. But this quick access and efficiency comes with risks. With <a href="https://www.comptia.org/content/articles/what-is-iot-cybersecurity" target="_blank">more than 24 billion IoT devices active today</a>, hackers can use this technology against users to launch devastating cyberattacks.&nbsp;</p> <figure role="group"> <div alt="Internet of Things Interconnected WiFi devices in household" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="11ab749f-8df2-4d77-ad2a-642f1e511d0f" data-langcode="en" title="March 2025 Blog Internet of Things Cybersecurity" class="embedded-entity"> <img loading="lazy" src="/sites/default/files/AdobeStock_378969966%20-%20Gorodenkoff.jpg" alt="Internet of Things Interconnected WiFi devices in household" title="March 2025 Blog Internet of Things Cybersecurity" typeof="foaf:Image"> </div> <figcaption>漏 Gorodenkoff/Adobe Stock</figcaption> </figure> <p>&nbsp;</p> <p><strong>The Inherent Cybersecurity Risks of IoT&nbsp;</strong></p> <p>Some types of IoT devices are less likely to have strong security features, making them easy targets for cybercriminals. Hackers can take advantage of weaknesses like <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/exposure-management/internet-of-things-iot-security/" target="_blank">easy-to-crack passwords, outdated software, or no built-in security protections</a> to steal data, spy on users, or cause disruptions.&nbsp;&nbsp;</p> <p>The rise of botnets, where a single hacker or group can take control of thousands鈥攐r even millions鈥攐f devices, is just one way that malicious actors are launching large-scale cyberattacks. One of the most infamous of these is the <a href="https://www.cisecurity.org/insights/blog/the-mirai-botnet-threats-and-mitigations" target="_blank">Mirai botnet</a>, which exploits weak default passwords to install malware in IP routers, cameras, and DVRs, remotely controlling them to act as 鈥渂ots鈥?for further attacks. In 2016, compromised devices were used to launch a massive Distributed Denial-of-Service (DDoS) attack, which overwhelmed websites and online services and caused widespread internet outages affecting platforms like Netflix and Reddit. In late 2024, Cloudflare reported mitigating a record-breaking DDoS attack that targeted an East Asia-based telecommunications firm, with the <a href="https://www.forbes.com/sites/kateoflahertyuk/2025/01/22/record-breaking-ddos-cyberattack-reaches-56-tbps-cloudflare-reports/" target="_blank">attack peaking at a record 5.6 terabits per second and lasting 80 seconds</a>. In early 2025, a large-scale DDoS attack caused intermittent <a href="https://www.wired.com/story/x-ddos-attack-march-2025?utm_source=chatgpt.com" target="_blank">outages to the social network X</a>.&nbsp;</p> <p>IoT devices in smart homes, fitness trackers, and industrial sensors also collect vast amounts of personal and business data. Without strong security, this information can be stolen or misused. <a href="https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Internet-of-Things-Increasing-Threats-Electric-Grid/" target="_blank">IoT devices embedded in power grids</a>, hospitals, and transportation also open these crucial systems to real-world harm, including critical infrastructure outages or <a href="/blog/why-cybersecurity-is-important-for-the-healthcare-industry" target="_blank">medical equipment failures</a>.&nbsp;</p> <p><strong>Strategies to Strengthen IoT Security&nbsp;</strong></p> <p>To reduce these risks, individuals and businesses must take proactive steps. Changing default passwords and using multi-factor authentication (MFA) can strengthen security and prevent unauthorized access. <a href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/cybersecurity-for-the-iot-how-trust-can-unlock-value" target="_blank">Keeping firmware and software updated</a> is essential for fixing security holes and preventing exploits. Keeping IoT devices on a separate network from critical systems can also limit exposure in case of an attack, and encrypting communication between IoT devices can help prevent unauthorized access to sensitive data.&nbsp;</p> <p>Cybersecurity experts play a key role in developing and using new tools to combat these challenges. <a href="https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity" target="_blank">Artificial intelligence can help identify unusual activity in real time</a>, allowing faster responses to cyber threats. The Zero Trust Architecture approach requires every device to be verified before accessing a network, reducing the chances of unauthorized access. Blockchain technology can create <a href="https://www.sciencedirect.com/science/article/pii/S2405844024149481#:~:text=Blockchain%20technology%20and%20the%20IoT%20offer%20a%20promising%20future%20for,allows%20for%20granular%20access%20control." target="_blank">secure, tamper-proof records of device activity</a>, making it harder for hackers to manipulate data. As IoT expands, the need for cybersecurity professionals grows, with ethical hackers, security analysts, and IoT risk managers playing a crucial role in protecting these networks.&nbsp;</p> <p><strong>Education in IoT Security&nbsp;</strong></p> <p>IoT is here to stay, and its security challenges will only increase as the network of connected devices expands. Cyber professionals must stay up to date with technological advancements, and how they work for, and against, sensitive IoT systems.&nbsp;</p> <p>Capitol Technology University鈥檚 award-winning programs in <a href="/fields-of-study/cyber-and-information-security" target="_blank">cyber and Information security</a> can prepare you to create this safer and more secure digital world. With resources such as our鈥?lt;a href="/student-experience/centers-and-labs/cyber-lab" target="_blank">Cyber Lab</a>鈥痑nd鈥?lt;a href="/student-experience/centers-and-labs/critical-infrastructure-center-cic" target="_blank">Critical Infrastructure Center</a>鈥?CIC), as well as our expert faculty and partnerships with leading cyber agencies, Capitol Tech empowers graduates to succeed in this diverse and expanding field.&nbsp;</p> <p>To discover our academic programs,鈥?lt;a href="mailto:admissions@captech.edu" target="_blank">contact our Admissions team</a>鈥痮r鈥?lt;a href="/request-information" target="_blank">request more information</a>.&nbsp;</p> <p lang="EN-US">&nbsp;</p> <p lang="EN-US"><em>Edited by Erica Decker&nbsp;</em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51066" class="section background-white"> <div class="super-contained"> </div> </section> Wed, 07 May 2025 13:38:43 +0000 emdecker 12946 at Cyber Attacks on Grocery Stores Threaten Food Security and Supply Chains /blog/cyber-attacks-on-the-food-industry-supply-chain Cyber Attacks on Grocery Stores Threaten Food Security and Supply Chains <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-03-07T16:08:34-05:00" title="Friday, March 7, 2025 - 16:08">March 7, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/cyberattacks%20on%20grocery%20stores%20and%20food%20industry.jpg" width="4832" alt="cashier scanning grocery store items" typeof="foaf:Image"> <p><span><span><span><span><span><span>We鈥檝e all seen news reports with pictures of empty grocery store shelves and closed checkout lanes. While the cause of these problems has often come from some combination of factors like panic-buying, natural disasters, understaffing, or physical supply chain problems, there are new concerns about the vulnerability of digital systems that increasingly manage everything from inventory to logistics to transportation and more. In the near future, those empty shelves may be caused by something more sinister鈥攃yberattacks.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>From Farm to Table: A History of Digital Transformation in the Food Industry</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Historically, food safety and security in the United States has focused on the improvement of physical labor conditions, manufacturing plant sanitation, and product quality control. Over the last century, federal <a href="https://www.fsis.usda.gov/about-fsis/history">agencies like the USDA and FDA have set rigorous standards</a> for food preparation, production, processing, and distribution to prevent contamination and reduce foodborne illnesses and related deaths. In today鈥檚 more technology-driven world, 鈥?lt;a href="https://www.techtarget.com/whatis/feature/The-future-of-the-food-industry-Food-tech-explained">food tech has become its own sector</a> with the rise of big data, AI and the internet of things (IoT).鈥?While this shift has brought innovations such as food product tracking, inventory management efficiency, and streamlined logistics, it has also created new vulnerabilities via cyber hacking.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>According to a 2023 report by the Food and Agriculture-Information Sharing and Analysis Center (Food Ag-ISAC), the food and agriculture industry faced 167 ransomware attacks that year. This was the seventh highest out of eleven other sectors featured in the study, trailing critical manufacturing and financial services. The interconnectedness of the food industry鈥檚 infrastructure also creates vulnerability, as cyberattacks could quickly spread between systems and even affiliated companies. The food industry is estimated to be worth more than $1 trillion <a href="https://www.techtarget.com/whatis/feature/The-future-of-the-food-industry-Food-tech-explained">in the U.S.</a>, and with over 333 million people relying on the dependability of this market, the stakes are high.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Grocery Stores: The Next Cyber Frontier&nbsp;</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>A cyberattack on your local grocery store can create financial losses, threaten food security, and destabilize food supply chains. A successful attack could lead to those empty shelves at the store because companies cannot process deliveries. It could affect your wallet, too, because limited supply could eventually increase food prices. And the integrity of the food supply can be compromised if refrigeration systems are affected, causing food to spoil.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The often-limited cybersecurity resources and reliance of grocery stores on complex IT systems, especially among smaller regional chains, make them a prime target for cybercriminals to unleash attacks in a variety of ways.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Ransomware attacks using malicious software can prevent stores from processing payments, managing inventory, or even opening their electronic doors until they pay their attackers to release these systems. Data breaches can compromise sensitive customer information, eroding trust and increasing legal exposure. Attackers can also target third-party vendors to interrupt the flow of goods to stores. Point-of-sale skimming attacks, where compromised card readers steal payment data, can put customers at financial risk.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>In 2023, Dole, a well-known fruit and vegetable distribution company, was forced to pause North American production and shipments, leading to a nationwide lettuce supply shortage. In 2021, JBS, a multi-national food company, was attacked by hackers, resulting in a ransom payout of $11 million.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>鈥?lt;/span></em></span></span></span></span><span><span><span><strong><em><span>Food </span></em></strong></span></span></span><span><span><span><span><em><span>security is </span></em></span></span></span></span><span><span><span><strong><em><span>national </span></em></strong></span></span></span><span><span><span><span><em><span>security, so it鈥檚 critical that American agriculture is protected from cyber threats. No longer just some tech issue, cyberattacks have the potential to upend folks鈥?daily lives and threaten our food supply.鈥?鈥?lt;a href="https://www.gillibrand.senate.gov/news/press/release/gillibrand-cotton-colleagues-introduce-legislation-to-address-cybersecurity-threats-to-american-agriculture/">Rep. Elissa Slotkin, D-Mich</a>.</span></em></span></span></span></span></p> <p><span><span><span><span><span><span>For consumers, limited access to food can have devastating effects, particularly in vulnerable communities already facing food insecurity. The possible panic-buying and price-gouging that might result could make it harder for families to put food on their tables. Consumers may also resist shopping at stores they perceive as vulnerable, which could result in loss of business and even bankruptcy for the company.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Building a More Secure Food Supply Chain</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Protecting our food supply chain from cyberattacks requires proactive and coordinated strategies. At the federal agency level, it remains to be seen what impact the <a href="https://www.axios.com/2025/02/20/fda-food-division-cuts">major 2025 federal staffing and funding cuts will have on the ability to introduce or maintain food safety</a> and cybersecurity programs in the U.S.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To combat cyberattack threats, <a href="https://www.forbes.com/sites/daphneewingchow/2024/09/20/agri-food-sector-under-increasing-threat-from-cyber-attacks/">grocery stores must strengthen their cybersecurity infrastructure</a>, including firewalls, intrusion detection systems, and data encryption. Regular vulnerability assessments and penetration testing can help identify weaknesses in systems before attackers can exploit them. Developing incident response plans is also crucial for minimizing the impacts of a successful attack. Outdated legacy systems should be reviewed and reworked as well, with modern technology and advanced cyber threats in mind.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>"The legacy systems that many companies rely on today are not built to withstand the complexity and scale of modern cyber threats. Unknown and unresolved issues within the underlying legacy software will continue to expose the companies to catastrophic failure or cyber attacks." 鈥?lt;a href="https://www.forbes.com/sites/daphneewingchow/2024/09/20/agri-food-sector-under-increasing-threat-from-cyber-attacks/">Cory Brandolini, co-founder of Railtown</a>&nbsp;</span></em></span></span></span></span></p> <p><span><span><span><span><span><span>Collaboration and information-sharing within the food industry can help stores and suppliers stay ahead of evolving cyber threats. And as <a href="https://www.cisecurity.org/insights/blog/why-employee-cybersecurity-awareness-training-is-important">knowledgeable employees are typically the first line of cyber defense</a>, comprehensive IT training and awareness programs to educate all staff鈥攁nd consumers鈥攁bout phishing scams, social engineering tactics, and other common attacks is a critical aspect of any cybersecurity plan. Protecting these digital systems and mitigating these threats is not only good for business, it is necessary for our communities to survive as we further integrate technology into this industry.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Exploring a Career in Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Addressing the complex challenges of cybersecurity in supply chain management requires well-educated professionals equipped with the specialized knowledge and skills necessary to defend against a multitude of threats. Capitol Technology University's <a href="/fields-of-study/critical-infrastructure">critical infrastructure programs</a> are uniquely designed to meet this demand. Our curriculum delves into the specific vulnerabilities of critical systems, providing students with hands-on experience in areas like network security, penetration testing, and incident response. With resources such as our <a href="/student-experience/centers-and-labs/cyber-lab">Cyber Lab</a> and <a href="/student-experience/centers-and-labs/critical-infrastructure-center-cic">Critical Infrastructure Center</a> (CIC), as well as our expert faculty and partnerships with leading cyber agencies, Capitol Tech empowers graduates to succeed in this diverse and expanding field.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more,&nbsp;<a href="mailto:admissions@captechu.edu">contact our Admissions Department</a>&nbsp;or&nbsp;<a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-50796" class="section background-white"> <div class="super-contained"> </div> </section> Fri, 07 Mar 2025 21:08:34 +0000 zqureshi 12766 at White House Cyber Initiative Aims to Fill 500,000 Open Cybersecurity Jobs /blog/critical-shortage-of-cybersecurity-professionals White House Cyber Initiative Aims to Fill 500,000 Open Cybersecurity Jobs <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2024-11-22T15:36:23-05:00" title="Friday, November 22, 2024 - 15:36">November 22, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Cyber%20Professionals%20Working%20on%20Cyber%20Initiative.jpg" width="640" alt="Cyber Professionals Working on Cyber Initiative" typeof="foaf:Image"> <p><span><span><span><span><span><span>In an increasingly interconnected world, cybersecurity has become an international concern. From protecting sensitive data to safeguarding critical infrastructure, skilled cybersecurity professionals are in high demand. However, the shortage of qualified experts poses a significant challenge. Recognizing this urgency, the U.S. White House鈥檚 Office of the National Cyber Director recently launched the "Service for America鈥?program, which aims to fill approximately 500,000 open cybersecurity positions in the United States by connecting Americans with jobs in cybersecurity, technology, and artificial intelligence (AI).</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The White House Cyber Initiative Addresses Critical Shortage of Cybersecurity Professionals</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The "<a href="https://www.whitehouse.gov/oncd/preparing-our-country-for-a-cyber-future/service-for-america/">Service for America</a>" program is a collaborative effort between the federal Office of Management and Budget (OMB), and the Office of Personnel Management (OPM). The primary goal is to address the critical shortage of cybersecurity professionals in the American job market. By establishing clear pathways for individuals seeking cybersecurity careers, National Cyber Director Harry Coker Jr. explains, the initiative can bring awareness to unknown positions, as 鈥渕any Americans do not realize that a cyber career is available to them.鈥?Whether through <a href="https://news.clearancejobs.com/2024/09/09/white-house-cyber-initiative-aims-to-fill-500000-open-cybersecurity-jobs/">formal education, apprenticeships, or reskilling programs</a>, the initiative aims to guide aspiring professionals toward relevant opportunities.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Recognizing that <a href="/blog/the-need-for-women-in-cybersecurity">diversity enhances problem-solving and innovation</a>, the initiative actively encourages participation from underrepresented groups. In doing so, it seeks to create a more inclusive and robust cybersecurity workforce.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Specific actions taken in promotion of this initiative include the development of the National Initiative for Cybersecurity Careers and Studies (NICCS) <a href="https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool">Cyber Career Pathways Tool</a> that 鈥減resents a new and interactive way to explore work roles within the Workforce Framework for Cybersecurity (NICE Framework).鈥?<a href="https://www.whitehouse.gov/wp-content/uploads/2024/09/Service-for-America-Checklist-for-Job-Seekers.pdf">USAJobs applicants are also encouraged to include the term</a> 鈥淪erviceForAmerica鈥?tag in their resume to make it more searchable for federal hiring managers. There are also several recommended portals and events that cyber career applicants are recommended to explore.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Additionally, the program is <a href="https://www.whitehouse.gov/oncd/briefing-room/2024/10/18/service-for-america-cyber-talent-is-everywhere-and-opportunity-should-be-too/">collaborating with universities, community colleges, and technical schools</a> like Pennsylvania Cybersecurity Center (PCC) and University of Wisconsin-Whitewater (UW-Whitewater) to develop specialized cybersecurity curricula. <a href="/blog/importance-of-higher-education-cybersecurity-studies">By aligning education with industry needs</a>, it ensures that graduates are well-prepared for real-world challenges. And because existing professionals need continuous training to keep pace with evolving threats, the program is <a href="https://federalnewsnetwork.com/cybersecurity/2024/09/wh-launches-cyber-hiring-sprint-to-fill-open-tech-roles/#:~:text=The%20White%20House%20is%20pushing%20to%20fill%20hundreds%20of%20federal">investing in upskilling and professional development programs</a> to enhance the capabilities of the current workforce.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Some institutions have been forging pathways to cybersecurity education for several decades. Since 1927, Capitol Technology University was established on the foundation of this need for accessible education in industry relevant skills, and offers <a href="/fields-of-study/cyber-and-information-security">Cybersecurity programs for professional career development</a>. Designated by the National Security Agency (NSA) and Department of Defense (DoD) as a National Center of Academic Excellence in Cyber Defense (NCAE-CD), Capitol Tech is a recognized leader in cyber education.&nbsp;</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Examining Other Cyber Workforce Initiatives</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Other cyber initiatives, such as "Service for America," build upon previous efforts by the government to bolster cybersecurity education and recruitment. The <a href="https://www.nist.gov/itl/applied-cybersecurity/nice">National Initiative for Cybersecurity Education(NICE)</a> was launched in 2014 by the National Institute of Standards and Technology (NIST) to focus on cybersecurity education, training, and workforce development. It provides a framework for defining skills, competencies, and career pathways.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The <a href="https://new.nsf.gov/funding/opportunities/sfs-cybercorps-scholarship-service">Scholarships for Service program</a>, administered by the National Science Foundation (NSF), offers scholarships to undergraduate and graduate students pursuing cybersecurity degrees. In return, recipients commit to working in federal agencies for a set number of years upon graduation. Similarly, the <a href="https://sfs.opm.gov/">CyberCorps Scholarship for Service program</a> provides scholarships to students studying cybersecurity. Graduates then serve in government agencies or critical infrastructure sectors, helping protect national interests.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The Critical Need for Cybersecurity Professionals</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Malicious actors can use advancing technology like AI and cyrptography to better exploit vulnerabilities in software, networks, and critical infrastructure. The <a href="https://www.mckinsey.com/industries/public-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks">need for skilled professionals who can defend against these threats</a> is more critical than ever. Cybersecurity experts play a crucial role in ensuring system integrity, while also <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories">protecting against and mitigating the fallout from an increasing number of data breaches and cyberattacks</a>.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The "Service for America" initiative represents a significant step toward closing the cybersecurity job gap. By educating, diversifying, and upskilling the workforce, government and private organizations can better defend against cyber threats and secure our digital future.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more about Cybersecurity programs at Capitol Technology University,&nbsp;<a href="mailto:admissions@captechu.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-49476" class="section background-white"> <div class="super-contained"> </div> </section> Fri, 22 Nov 2024 20:36:23 +0000 zqureshi 12441 at Are Passwords Becoming a Thing of the Past? /blog/are-passwords-becoming-thing-of-past Are Passwords Becoming a Thing of the Past? <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2024-09-09T10:58:48-04:00" title="Monday, September 9, 2024 - 10:58">September 9, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Passwords-less%20Future%20Blog%20Sept%202024.jpg" width="640" alt="Passwords-less Future with Biometrics and AI" typeof="foaf:Image"> <p><span><span><span>In recent years, a conversation around the future and usefulness of passwords has grown among tech giants and cybersecurity professionals. The possibility of a password-less future, while not entirely new, has gained significant interest with the advancement of artificial intelligence, biometrics, and other technologies. While a complete shift away from passwords has yet to materialize, it may be closer than ever before. </span></span></span></p> <p><span><span><span><strong>The Password Landscape</strong></span></span></span></p> <p><span><span><span>Passwords have long been the cornerstone of digital security, but their effectiveness has been increasingly questioned. <a href="https://www.microsoft.com/en-us/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/?msockid=1566e1a9ab016a9d20e6f0afaa746b66">The rise in data breaches, phishing attacks, and the general inconvenience of managing multiple complex passwords</a> have led to calls for a more secure and user-friendly solution. Several tech companies are at the forefront of the password-less movement, each implementing innovative methods to enhance security and improve user experience.</span></span></span></p> <p><span><span><span>Microsoft, for instance, has introduced password-less sign-ins for many of its services, using methods like Windows Hello, which leverages facial recognition, and FIDO2 security keys, which allow users to authenticate with biometrics or a security key. Google has been promoting the use of two-factor authentication and has integrated biometric authentication into its services as well, recently announcing that <a href="https://www.msn.com/en-us/news/technology/google-is-getting-ready-to-kill-passwords-seriously/ar-AA1hZOeT#:~:text=Passwords%20aren%E2%80%99t%20going%20away%20immediately%2C%20and%20it%20will,opt%20out%20of%20using%20passwords%20altogether%2C%20for%20now.">passkeys would replace passwords as the default sign-in method</a>. Apple鈥檚 Face ID and Touch ID are prime examples of biometric authentication that aim to replace traditional passwords. These companies are not only enhancing security but also improving user experience by reducing the reliance on passwords and creating an easier and more convenient authentication process.</span></span></span></p> <p><span><span><span><strong>Password-less Pros and Cons</strong></span></span></span></p> <p><span><span><span>According to Verizon, <a href="https://www.cnbc.com/2022/04/24/what-a-future-without-passwords-would-look-like-when-it-might-happen.html">more than 80% of data breaches result from weak or compromised passwords</a>, so the push for password-less authentication brings several advantages. Enhanced security is a significant benefit, as password-less methods such as biometrics and hardware tokens are generally harder to steal or replicate due to their nature. Eliminating the need to remember multiple passwords simplifies the user experience, and biometric authentication, for example, is quick, easy, and always within the user鈥檚 control. Additionally, with less credentials to steal, phishing attacks could become less prevalent. </span></span></span></p> <p><span><span><span>However, a password-less future would also present new challenges. Implementation costs can be a significant barrier for organizations, as transitioning to password-less systems would likely require new hardware and software for capturing or storing biometric or passkey data. Many alternatives are only available on select websites and apps, meaning <a href="https://www.consumerreports.org/electronics/digital-security/should-you-use-passkeys-instead-of-passwords-a1201817243/?msockid=1566e1a9ab016a9d20e6f0afaa746b66">users may need to manage both passwords and alternative authentication methods</a> until the technology becomes more widely used. Because biometric data cannot be changed, it can pose significant privacy risks if compromised. And not all users may have access to the necessary technology, such as smartphones with biometric capabilities and physical security keys, nor is everyone comfortable with having their biometric information captured for privacy reasons.</span></span></span></p> <p><span><span><span><strong>The Impact of AI on Cybersecurity and Passwords</strong></span></span></span></p> <p><span><span><span>AI is playing a crucial role in the development and implementation of password-less authentication methods. Behavioral biometrics, for instance, use AI to analyze patterns in user behavior, such as typing speed and mouse movements, to authenticate users without the need for passwords. AI-powered voice recognition systems are also being developed to authenticate users based on their unique vocal patterns. Additionally, AI algorithms can detect unusual activities and potential security threats in real-time, providing an additional layer of security.</span></span></span></p> <p><span><span><span>The intersection of AI and cybersecurity is fostering new trends that support the move towards password-less authentication through "adaptive authentication."&nbsp;<a href="https://www.onelogin.com/learn/what-why-adaptive-authentication">AI systems can adapt authentication methods</a> based on the context, such as the user鈥檚 location or the device being used, which can enhance security without compromising convenience. Continuous authentication is another trend where AI continuously monitors and authenticates users throughout their session, thus reducing the risk of unauthorized access. The zero-trust security approach, which assumes that threats could be both external and internal, leverages AI to continuously verify users and devices, making password-less authentication more robust. Conversely, AI technology is also <a href="https://www.forbes.com/sites/daveywinder/2024/06/19/smart-guessing-algorithm-cracks-87-million-passwords-in-under-60-seconds/">making it easier for passwords to be cracked</a> through tactics like 鈥渟mart-guessing algorithms.鈥?lt;/span></span></span></p> <p><span><span><span>While passwords have been a staple of digital security for decades, the push towards password-less authentication is gaining momentum. Tech companies are leading the charge, leveraging AI and other technologies to create more secure, robust, and user-friendly authentication methods. However, the transition comes with its own set of challenges, including implementation costs and privacy concerns. As AI and cybersecurity continue to evolve, the dream of a password-less future may soon become a reality.</span></span></span></p> <p><span><span><span><strong>Cybersecurity Programs at Capitol Tech</strong></span></span></span></p> <p><span><span><span>Capitol Technology University offers a variety of <a href="/fields-of-study/cyber-and-information-security">Cybersecurity</a>&nbsp;and <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science">Computer Science programs</a> that can prepare you to create a password-less future and analyze the risks and cyberthreats of today鈥檚 digital landscape. To learn more, <a href="mailto:admissions@captechu.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>. </span></span></span></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/artificial-intelligence" hreflang="en">Artificial Intelligence</a> <section id="section-48891" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 09 Sep 2024 14:58:48 +0000 emdecker 12196 at Top Cyber Scams to Watch Out For in 2024 /blog/top-cyber-scams-watch-out-2024 Top Cyber Scams to Watch Out For in 2024 <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2024-07-22T11:17:46-04:00" title="Monday, July 22, 2024 - 11:17">July 22, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Top%20Scams%20of%202024%20Blog%20-%20July%202024.jpg" width="640" alt="Top Cyber Scams of 2024" typeof="foaf:Image"> <p>Digital-based scams are nothing new, but recent technological developments 鈥?especially in artificial intelligence 鈥?are helping scammers grow more sophisticated in their attacks and leaving users more vulnerable. In 2023, the FBI reported nearly 900,000 cases of suspected internet crime totaling nearly $12.5 billion in damages and losses. The lucrative nature of these attacks and the challenge users face in battling these evolving schemes means these numbers are likely to increase in the future unless we take proactive measures to protect ourselves. Here, we look at some of the newest and most innovative scams to watch out for in 2024 and beyond.&nbsp;</p> <p><strong>Crypto Scams&nbsp;</strong></p> <p><a href="https://www.forbes.com/advisor/investing/cryptocurrency/top-crypto-scams/" target="_blank">Investment scams promise huge financial gains on cryptocurrency investments</a> for the holder if they transfer their cryptocurrency to the fake financial manager. Scammers may also pray on individuals鈥?vulnerabilities by posing as celebrities or potential love interests, or socially engineer scams through social media. Once the crypto is transferred, the criminal sells or offloads the coin, leaving the original holder empty-handed.&nbsp;</p> <p>Cryptocurrency phishing scams involve deceptive tactics that trick individuals into revealing sensitive information, such as private keys or personal details related to their digital wallets. Scammers often initiate these attacks through email, social media, and text messages. By sending emails that mimic legitimate crypto exchange communications or creating lookalike replicas of authentic crypto trading platforms, scammers may get users to unknowingly enter their private keys onto these sites.&nbsp;&nbsp;</p> <p>Scammers are also targeting crypto holders through fake software upgrades and stealing two-step verification codes often required to access digital wallets. Others set up fake crypto exchanges and wallets, enticing users with lower prices and frequent investment requests.&nbsp;</p> <p><strong>Robocall Scams</strong>&nbsp;</p> <p>Long the bane of nearly all recipients, robocalls are nothing new. However, as these calls become powered by artificial intelligence, they are becoming increasingly convincing and manipulative. AI can be used to clone voices and spoof numbers, making scam calls look like legitimate outreach from banks, government agencies, and other organizations. 鈥淲hen combined with well-thought-out social engineering campaigns, GenAI can cause unprecedented financial damage in mass-scale phishing or fraud campaigns,鈥?states&nbsp;Dr. Ilia Kolochenko, an adjunct professor at Capitol Technology University and global cybersecurity expert, <a href="/news-events/first-ai-robocall-scammer-named-fcc-capitol-tech-faculty-gives-expert-opinion-fox-news" target="_blank">in his recent interview with Fox News</a>. &nbsp;</p> <p>AI is even being used to spoof voices of family members and other loved ones <a href="https://www.newyorker.com/science/annals-of-artificial-intelligence/the-terrifying-ai-scam-that-uses-your-loved-ones-voice" target="_blank">to fake kidnappings and demand ransom</a>. These scams are so prevalent and dangerous that <a href="https://www.wired.com/story/ai-generated-voices-robocalls-illegal-fcc/" target="_blank">using AI-generated voices in robocalls is now illegal in the United States</a>.&nbsp;</p> <p lang="EN-US"><strong>Exploitive Emails&nbsp;</strong></p> <p lang="EN-US">The number of exploitive spam and scam emails that people receive daily is daunting. Some hackers have found a <a href="https://it.ucsf.edu/jan-2023-phishing-attacks-abuse-microsoft-onenote" target="_blank">new exploitation by using a workaround within OneDrive and the app, OneNote</a>. They send what looks to be a legitimate link to your email, which opens a OneNote file. There may be a 鈥渂utton鈥?to press, such as 鈥淰iew PDF Here,鈥?which is actually an overlay banner hiding several run scripts and .exe (execute) files underneath. When you click the 鈥渂utton鈥? you initiate a malware download onto your device. They can also manipulate the OneNote file to ask you to enter your OneDrive credentials. If you receive an unexpected OneDrive or OneNote file from a trusted sender, such as in the workplace, it is best to call the sender to be sure it鈥檚 safe before opening.&nbsp;</p> <p><strong>AI-Powered Scams&nbsp;</strong></p> <p>Despite many of these tech-based scams being around for decades, artificial intelligence is helping to make them easier to set up and harder to detect. AI is being used to <a href="https://www.fbi.gov/contact-us/field-offices/sanfrancisco/news/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence" target="_blank">write more believable text for phishing emails and create fake social media profiles</a> that can trick users into sharing personal information. Fake apps and websites may claim to use GPT technology but are a vehicle for scammers to trick users into entering sensitive information. And AI-powered scams are deceiving people in two of their most vulnerable settings 鈥?in the workplace and in their love lives 鈥?by creating convincing but fake job postings and online dating profiles. Backed by AI, these scams can more efficiently and effectively trick users and leave them vulnerable to financial and emotional exploitation.&nbsp;</p> <p><strong>Other Cyber Threats&nbsp;</strong></p> <p>While these scams may be the most novel or prevalent, there are plenty of other cyberthreats threatening our financial security. Instead of being erased chemically, <a href="https://www.aarp.org/money/scams-fraud/info-2023/top-scammer-list.html" target="_blank">physical checks can be altered digitally</a> and reprinted to show a new payee and then deposited through a mobile banking app. Scammers can also capture your simple responses during a phone call to create a deepfake of your voice to navigate automated phone menus and conversations for their benefit. These deepfakes&nbsp;can be applied to the common 鈥済randparent scam,鈥?where someone pretends to be a grandchild in legal trouble who calls their grandparent asking for money. In a similar tactic, scammers may pretend to be a family member who is having trouble on a trip 鈥?a lost wallet, a run in with police, a medical emergency 鈥?and then reach out to a person鈥檚 phone contacts or Facebook friends asking for money. Fraudulent claims that you鈥檝e won a digital sweepstakes can leave you vulnerable to identify theft as well, as scammers may ask for personally identifiable information like a social security number to distribute your prize. When they have that information, they can open credit cards in your name and access other financial resources.&nbsp;</p> <p lang="EN-US"><strong>Quick Tips for Protecting Against Scams&nbsp;</strong></p> <p lang="EN-US">When protecting yourself against cybercriminals, you must be vigilant and wary of incoming threats. From emails to physical mail to phone calls to social media messages 鈥?<a href="https://consumer.ftc.gov/articles/how-avoid-scam" target="_blank">each of these avenues has potential for scams</a>. Below are just a few of the many tips that can help prevent falling victim to such crimes:&nbsp;</p> <ul role="list"> <li> <p lang="EN-US">DO NOT CLICK any links within an email, text, or social media message that you do not trust. If you do trust the sender and they send you a link unexpectedly, call them to verify first. Even trusted sources can get hacked, and even just clicking a link or opening a PDF, etc. can install malware onto your computer.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">If it sounds too good to be true, it is. Do not trust offers of money, free items, or suspiciously good deals, especially if it requires an exchange of sensitive information, money up front, or bargaining outside of a protected site.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Hover your mouse over a hyperlink (do not click it) to check what the actual link directs to 鈥?if it is different from the hyperlink text, avoid it.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Be wary of solicitors that call you first, or out of the blue. For example, if your bank calls you asking for information, politely hang up and call the number on their official website and check if they just called you. More likely than not, the original call&nbsp;was not from them.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Look out for spoof numbers that pretend to be from a legitimate source. Malicious actors can mask their numbers to read as actual government agencies like the FBI.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Agencies like the IRS, <a href="https://mva.maryland.gov/about-mva/Pages/Premier-Customer-Protection.aspx" target="_blank">MVA (DMV)</a>, and United States Postal Service have specific methods of contacting you and what information they collect. For example, the IRS will never call or email you, they only send physical mail, and the USPS will not text you about a package hold. Be wary of suspicious communications from people who claim they are from these agencies.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Shred documents and mail that display your information before throwing them away.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Be on the alert for Facebook marketplace or Craigslist scams, like fake paper bills, fake Zelle and PayPal emails or texts, and other scams. &nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Do not log into an account from an email or text received. Type the site into your browser or log in from the app. &nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Set up online banking alerts for any transaction run on your credit card or accounts. Most banks will send a text alert for any charge, or changes made to your account, but you often need to set these parameters yourself.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Consider setting up secure online payments for bills instead of sending physical checks in the mail, as this practice has become increasingly risky.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Install and routinely run anti-virus on your devices from trusted vendors and have your Windows, Android, or Apple software set to update regularly. Security patches are important for protecting your computer and cell phone.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Do your research 鈥?watching the news, joining your neighborhood鈥檚 Nextdoor app group, and searching information online from legitimate sites can help you stay in-the-know as to what to watch out for when it comes to both local and global scams.&nbsp;</p> </li> </ul> <p><strong>Cybersecurity Education with Capitol Tech&nbsp;</strong></p> <p>Capitol Technology University is a leader in cybersecurity education, recognized by the National Security Agency (NSA) and Department of Defense (DoD) as a National Center of Academic Excellence in Cyber Defense (NCAE-CD). We are committed to cyber education that emphasizes the ethical and technical proficiencies needed to excel in the field. Our <a href="/fields-of-study/cyber-and-information-security" target="_blank">Cyber &amp; Information Security programs</a> teach students how to identify and protect against cyber scams that threaten organizations, helping them become experts across many industries and trades. For more information,&nbsp;<a href="mailto:admissions@captechu.edu" target="_blank">contact our Admissions team</a> or <a href="/request-information" target="_blank">request more information</a>. &nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/artificial-intelligence" hreflang="en">Artificial Intelligence</a> <section id="section-48466" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 22 Jul 2024 15:17:46 +0000 emdecker 11886 at