article thumbnail

Protect Yourself Before You Wreck Yourself: Understanding Security Threats

Tech Soup

There was some relief at the end of this presentation, however — the researchers provided some tips for organizations: Be careful of connecting mobile phones to enterprise computers for charging purposes. " In other words, the scammer can act like a familiar contact and even bring up personal information to you.