by Dr. Lee Mangold | Feb 9, 2023 | Uncategorized
Is this what you expected to find at the URL you just clicked? Domain Doppelganger (aka Lookalike domains) are URLs that look similar to a trusted URL, but have subtle differences. Doppelganger domains are used to trick users into visiting a malicious website...
by Dr. Lee Mangold | Jul 31, 2022 | Technology
Nearly a decade ago I was approached by a defense colleague with this crazy idea of creating a high school cybersecurity summer camp program. We knew it would be a lot of work, but we also knew there was a very real need in our industry: we just don’t have...
by Dr. Lee Mangold | Apr 18, 2017 | Technology
The occurrence of data breaches has been on a continual rise over the past 18-24 months. Some of this is arguably due to increased reporting, but what about the rest? How do some of the largest companies in the world manage to get breached by so-called “advanced”...
by Dr. Lee Mangold | May 4, 2014 | Technology
Stanford recently published a new security policy allowing their users to choose length over complexity. Password complexity has always been the go-to answer for creating secure passwords. Of late, there has been a big push to change that; and for good...
by Dr. Lee Mangold | Apr 13, 2014 | Technology
My second presentation at BSides Orlando 2014 was on Open Source Enterprise security solutions. The idea was to present a number of tools to help the struggling small business meet enterprise security objectives. It’s easy to forget that many (most?)...