This project was about sharing some examples of cyberattacks on the news.
This article talks about a phishing scams in Arizona where ATMs were used to turn cast into cryptocurrency. Phishing scams is pretending is a trustworthy company in this case to take your personal information, credit card number, social security numbers, etc. The phishing scams affected to million of Americans. To protect you from scams you should: inspect the ATM before used, enable transactions alert, and report suspicious transactions immediately.
Who publishes the article? Curt Devine, Majlie de Puy Kamp, Yahya Abou-Ghazala, Casey Tolan, Kyung Lah, Amy O'Kruk, Byron Manley and Eleanor Stubbs, CNN.
Where was it published? CNN News.
When was it published? October 14, 2025
The truthfulness and integrity of the facts? Specific details, and identities.
How is it written and presented? To inform people are being scams using companies name like ATMs.
Link and citations: Quotes from victims, links to documents, and reports.
This article talks about Ransomware attack Kettering Health in Ohio the attack disrupt many digital operations across the organization, that runs 14 hospitals and over 120 outpatient facilities; many patients were affected caused of the cyber attack. Ransomware is a cyber attack that lock your data and ask for money to unlock it. To protect you from Ransomware attacks you should: limit user permissions, don't click to unknow links and use strong passwords.
Who publishes the article? Sean Lyngass and CNN.
Where was it published? CNN.
When was it published? May 20, 2025
The truthfulness and integrity of the facts? Cites credible, details, and multiple sources.
How is it written and presented? Presented to aware people of cyberattacks.
Link and citations: Some quotes from Kettering Health and links to reports.
From this assignment I learned that you cannot trust in links, or companies only because it has the name company you need to verify and be careful, if is a trust source to give your information to not get scam or be a victim of a cyberattack.