To be honest, I'm surprised this story has been so little mentioned by mainstream media. It just may be a case of cybersecurity-breach overload. The average person has simply become immune to stories of breaches exposing the personal information of millions of individuals. Unless they are included in the breach, most people don't see its … Continue reading Will This Be the Most Serious Cyber Attack of 2019?
Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. Most bank account hacks start with a social engineering angle. Hackers usually send the potential victim an email that seems to come from a reliable source. Then, they need to get the … Continue reading Hackers Find a New Way to Get Control of Your Bank Account
We are algorithms with legs. Ok, maybe I should clarify that. Our brains employ self-learning algorithms. Our brains induce patterns on the data that is being input into it. As babies, we may assume that all four-legged creatures are dogs. However, over time, our brains begin to differentiate dogs from cows and dogs from cats. … Continue reading When Algorithms Go Bad
As of this writing, the website for the Tibetan government in exile, the Central Tibetan Administration (CTA), appears to be under attack. This is nothing unusual. About this time every year the CTA, and other organizations connected to it, endure a variety of cyber attacks. According to Tenzin Dalha, a researcher at the Tibet Policy … Continue reading It’s Hacking Season in Tibet
5. Most Hackers Target Small Businesses Cyber attacks are always in the news, but usually only when they hit large companies or organizations. Yet, how many people know that hackers prefer to target small businesses? According to a recent report from Hiscox, "Forty‑seven percent of small businesses suffered at least one cyber attack in the … Continue reading 5 Surprising and mostly Unknown Cyber Security Facts
Imagine getting a friend request from your favorite YouTube celebrity. Of course, you might be skeptical. However, when you check the request out, it seems real and actually comes from the account of that celebrity. Here is an example that I put together to show what the request would look like. Even if you may … Continue reading Scammers Use Messages from YouTube Celebs to Gather Personal Information
Curiosity kills the spam email recipient. Promises of wealth or romance written into a subject line can be difficult to ignore, simply out of curiosity. "Maybe Citibank did find some money that they owed me." "Maybe those Russian women really do want to meet me." Sure. The current spam email that is building its curiosity … Continue reading “Love You” Phishing Emails Arrive in Time for Valentine’s Day