Category: Uncategorized
-
The Dangers of Romance Scams: A Valentine’s Day Warning

By: Myriam Sollberger February 13, 2025 As Valentine’s Day approaches, many people seek companionship and romance, making them particularly vulnerable to online scams. Romance scams, in which fraudsters use social media and online dating platforms to exploit lonely individuals, have become increasingly sophisticated due to advancements in artificial intelligence (AI) and social engineering techniques. This…
-
How AI is Changing Social Media Scams

February 12, 2025 By: Myriam Sollberger The Rise of AI-Generated Social Media Scams: How Scammers Use Artificial Intelligence to Target Individuals with Personalized Messages Social media platforms have become fertile ground for scammers employing artificial intelligence (AI) to create convincing fake profiles. These AI-generated personas are used to target individuals with personalized messages, leading to…
-
GIS Crime-Mapping

“Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information” (Channel , 2019). Reference: Channel , I. P. E. (2019, December 29). What is Social Engineering: Attack Techniques & Prevention Methods: Imperva.…
-
National Security Policy & Analysis Organization
American Public University System Student Organizations Hello! My name is Myriam, but you can call me by my nickname, which is Mimi. I graduated with my undergraduate Bachelor’s Degree Cum Laude Honors from the American Public University Systems Cybersecurity & Digital Forensics Program in December of 2020. Before attending APUS, I graduated from the City…
-
Let’s Talk About Hackers

“Cybercriminals are people who use computers or the internet to commit crimes. Both black- and gray-hat hackers may break the law, effectively becoming cybercriminals. All 50 states have computer crime laws governing the damage or disruption of computer systems”(Protection, 2022) . Reference: Protection, A. I. (2022, January 1). What’s the difference between hackers, Cybercriminals, and…
