Skip to content
POPCyber

POPCyber

Cybersecurity for all

  • Helpful links
  • Sextortion – Were you aware of it?
  • ‘ishing
  • About
  • Privacy Policy
  • OSINT – Tools of the trade
    • Judy Records
  • Toggle search form

Author: Griz

I am a cyber professional who has been computing since the late 1970s. My goal is to help our readers understand cybersecurity, for either protecting themselves, their family, or offices. A secondary goal is to help people into the cybersecurity field as a career.

Credential Stuffing

I know that you must get quite tired of hearing about your password. We tell you to keep it strong, use multi-factor authentication, blah blah blah… We often hear the same kinds of responses back, but it is just my email… I have nothing of interest in there. Yes, we know… and we sympathize. In…

Read More “Credential Stuffing” »

Uncategorized

Why is it dangerous to click on a random QR code?

Scanning a QR code itself is not inherently dangerous. QR codes are widely used for various purposes, such as providing information, accessing websites, making payments, and more. However, there are certain risks associated with scanning QR codes that can make them potentially dangerous if caution is not exercised. Here are a few reasons why scanning…

Read More “Why is it dangerous to click on a random QR code?” »

Uncategorized

Why is Password Reuse Bad?

Using the same password across multiple accounts is generally not a good idea for the following reasons: Security Breaches: If one account gets hacked, the hacker will be able to access all other accounts using the same password. Lack of Complexity: It is difficult to create a complex password that is unique for each account….

Read More “Why is Password Reuse Bad?” »

Uncategorized

What is Phishing?

Phishing is a type of cyber attack in which an attacker tries to trick a victim into giving away sensitive information such as usernames, passwords, credit card numbers, or other personal data. Phishing attacks typically occur through fraudulent emails, text messages, or websites that appear to be legitimate but are actually designed to deceive the…

Read More “What is Phishing?” »

Uncategorized

What are red flags when it comes to phishing?

There are several red flags that can help you identify a phishing email. Here are some common ones: If you notice any of these red flags in an email, it’s best to delete the email and not click on any links or provide any personal information. It’s always better to err on the side of…

Read More “What are red flags when it comes to phishing?” »

Uncategorized

What is Malware?

Malware, short for malicious software, is any type of software designed to harm, disrupt, or damage computer systems, networks, or devices. Malware can be created for a variety of purposes, such as stealing sensitive information, gaining unauthorized access to systems, or damaging or destroying data. Some common types of malware include viruses, worms, Trojan horses,…

Read More “What is Malware?” »

Uncategorized

Password Security

As I pondered how to best discuss password security, I wondered if I could find a nice history of when passwords came into use and how badly they have been handled over time. Little did I know, we have been quite bad with them since their inception. The resource I found for the subject did…

Read More “Password Security” »

Uncategorized

OSINT and leveraging the internet to your favor

More than likely even if you do not know the term OSINT, you have used it. If you have dated modern women, it has likely been used against you. OSINT is open source intelligence. Have you ever “Googled” someone or yourself? Then you have used OSINT. Open source intelligence is using any publicly available information…

Read More “OSINT and leveraging the internet to your favor” »

Uncategorized

Remote Access Scams

It always takes me by surprise when I hear of friends and acquaintances who have permitted email contacts of phone callers to have remote access to their systems. We spend a great deal of effort to safeguard our networks and systems. We protect against hackers, malware, etc. but then pay bad actors to log into…

Read More “Remote Access Scams” »

Uncategorized

Are your smart devices listening to you?

Let’s start our posts off in a fun way. A way that you can play along at home. I am sure that you have heard that websites use your browsing history to spy on where you browse, and what you search for. You likely know that your smart devices use GPS to track every move…

Read More “Are your smart devices listening to you?” »

Uncategorized

Posts pagination

Previous 1 2 3 Next
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-9333262976044598"
     crossorigin="anonymous"></script>

Copyright © 2026 POPCyber.

Powered by PressBook Masonry Dark