Monthly Archives: January 2015

Social Engineering Attacks: Why Some of Your Friends are Non-Human

And I don’t mean the guy in your office who never laughs at your jokes. I’m talking about your Facebook friends because, if you have a lot of them, it is almost guaranteed that some of them are not who … Continue reading

Posted in Uncategorized | Leave a comment

Deep Web Update: Going Down to See What’s Up

It’s that wonderful time of the year again, when all the information gathered by malware over the holidays begins to be distributed to all the eagerly awaiting customers in the deep web. Actually, it might be a little early. Most … Continue reading

Posted in Uncategorized | Tagged , , , , , , | 1 Comment

How I Managed to Predict Yesterday’s ISIS Cyber Attack 12 Hours Before It Occurred

Before I’m contacted by the FBI, I should explain how it happened that, over 12 hours before the ISIS cyber attack occurred, I had predicted something like it.  At the end of the blog post I put up yesterday predicting cyber … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Experts Say These Are the Breaches to Expect in 2015

At the beginning of every year, top security firms and professionals make predictions about what type of cyber attacks they expect to encounter in the next 12 months. I have looked at predictions made by 5 of the top experts … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

When Bullying Becomes a Good Business Strategy: Smartphone Patent Wars

Few will deny that Steve Jobs was a bully, both in his personal relationships and in his relationships with employees and co-workers in his company.  It should, then, be no surprise that he applied this methodology to his dealings with … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment