Remove Consumer Protection Remove CSO Remove Phishing
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Viewing these videos, adversaries can begin to compile metadata about an individual’s behaviors preferences – intel that could be applied toward targeting phishing campaigns, according to Setu Kulkarni, vice president of Strategy at WhiteHat Security. “It is deeply invasive for anyone who’s captured on film.”.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Sophisticated social engineering tactics, phishing campaigns, or financial incentives make it easier for cybercriminals to use insiders as tools for gaining access and maintaining their foothold in systems rather than hacking in. Cyber threats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol.