Attack of the Killer USBs: Don’t Be the Next Victim

Analyzing the threat ‘Killer USBs’ can be to a company’s sensitive data and networks When cybersecurity practitioners think about USBs, it’s often in the context of social engineering. A nefarious actor perhaps drops a malicious USB … Continue reading Attack of the Killer USBs: Don’t Be the Next Victim

How to back up and restore personal data safely from possibly exploited android phone?

I’m using a Samsung J7 Prime with Android version 7.0, not rooted.
Recently, I grew suspicious I had become the target of some kind of exploit/network attack/mitm. Since I suspect the exploit is probably running on the OS/fir… Continue reading How to back up and restore personal data safely from possibly exploited android phone?