Government Cybersecurity Agency Finds Vulnerabilities in Dominion Voting Machines

The Cybersecurity and Infrastructure Security Agency (CISA) recently announced that it had found nine vulnerabilities in Dominion Voting machines, or, as the company calls them, systems. The vulnerabilities listed by the government applied to the company's Imagecast X (ICX) system, pictured below. These systems are in use in the following states, which does not mean … Continue reading Government Cybersecurity Agency Finds Vulnerabilities in Dominion Voting Machines

New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Nearly everyone owns an endpoint. We generally call them smartphones or personal computers, but they can also be smart watches or smart TVs. In short, anything you own that can connect to the internet is a potential endpoint. However, they only reach the status of an endpoint when they become part of a network. Endpoint … Continue reading New AI Approach to Endpoint Protection Stops 92% of Cyberattacks but…

Selena Gomez Scams Fan out of $230,613.. sort of

At first, this was good for a laugh. Someone actually believed they were being contacted by Selena Gomez for help. How gullible can someone be! Here is the first part of the report that the victim filed with the Better Business Bureau. At this point you'd still have to wonder how the victim is falling … Continue reading Selena Gomez Scams Fan out of $230,613.. sort of

Online Form Information Harvested Even Before Submission

Did you ever begin to sign up for a newsletter or some website service and then change your mind? Maybe you were worried that you were giving out too much personal information on the form. Unfortunately, new research has found that the information you put on your form may have been harvested by third parties, … Continue reading Online Form Information Harvested Even Before Submission

How Russia’s YouTube was Nuked by the IT Army of Ukraine

Russia has its own version of YouTube called RuTube. It does much the same as YouTube does except that, among the usual videos on cooking and cats, you'll find it used as a propaganda platform for government controlled TV channels such as RT or Channel 1. RuTube is very popular and boasts over 25 million … Continue reading How Russia’s YouTube was Nuked by the IT Army of Ukraine

How Ransomware Gangs Negotiate with Their Victims

Hacking into a corporate network and encrypting files does not mean that a ransomware attack was successful. Ransomware attacks are only successful if they make money for the hacking group, and ransom payments can never be guaranteed. Almost no company will instantly agree to pay whatever ransom is demanded, unless the files are vital to … Continue reading How Ransomware Gangs Negotiate with Their Victims

Evil Job Interviews and Poisoned Resumes: Cyber Attacks and the Job Market

The prevailing political and economic atmosphere often determines the behavior of hackers. Look at today's job market. Currently, employers are having a difficult time finding workers. Under such conditions, they may be more willing to overlook weak candidates or poorly designed resumes to get people to fill a necessary position. Potential employees may be pickier … Continue reading Evil Job Interviews and Poisoned Resumes: Cyber Attacks and the Job Market

Digging up Sandworm: The Biggest Threat to the U.S. Power Grid

Russia's Sandworm hacking group has been specializing in bringing down power grids for years. It orchestrated the first recognized, successful attack on a power grid when it disrupted the power supply for 230,000 people in Ukraine in 2015. The following year, the Industroyer malware took down the power supply to one-fifth of the population of … Continue reading Digging up Sandworm: The Biggest Threat to the U.S. Power Grid

Clouds of Dangerous TLStorm Appear on the Horizon

Probably everyone has heard of zero-day attacks. These are attacks that take advantage of previously unknown software or hardware vulnerabilities to accomplish their goals. However, these attacks are rare, generally coming from well-funded government or private hacking groups. Most serious cyberattacks occur when hackers exploit unpatched but known vulnerabilities. These attacks succeed in proportion to … Continue reading Clouds of Dangerous TLStorm Appear on the Horizon

Scamming, Spying, and Stalking Using Call Forwarding

I don't use call forwarding and, because of this, I'd be a perfect target for the call forwarding scam. So, if you know nothing about call forwarding, read this post or become a victim. It's as simple as that. Call forwarding is a useful service. If, for example, you want calls forwarded from your office … Continue reading Scamming, Spying, and Stalking Using Call Forwarding