Massive 711 Million Emails and Passwords Dumped and You Are Probably on the List…I was

A malware researcher going by the Twitter handle, Benkow moʞuƎq, has uncovered a huge stash of emails and passwords stored on an open server in The Netherlands. The stolen credentials were apparently harvested by a spambot known as, Onliner. This spambot has been used to deliver banking malware which has compromised over 100,000 accounts. Troy … Continue reading Massive 711 Million Emails and Passwords Dumped and You Are Probably on the List…I was

How Free Security Tools and Online Scanners Are Used by Hackers

Endpoint detection and response (EDR) tools are becoming more common on those networks which allow access to a wide variety of endpoints such as smartphones and tablets. Basically, these tools continuously monitor behavior on these devices to see if anything unusual is going on. The information collected through this monitoring is sent to a central … Continue reading How Free Security Tools and Online Scanners Are Used by Hackers

The Awan Family Scam:  A Triumph of Political Correctness Over Cybersecurity

After being subjected to numerous, damaging cyber attacks, you would think the Democrats would have learned their lesson and become more cybersecurity aware. Unfortunately, this does not seem to be the case. As the scam perpetrated by the Awan family on House Democrats unfolds, it becomes apparent that it succeeded because of poor cybersecurity practices … Continue reading The Awan Family Scam:  A Triumph of Political Correctness Over Cybersecurity

Hammertoss: The Russian Government Malware that Uses Twitter to Steal Information

Antivirus software can't find every malware program on your computer or device. This does not mean you shouldn't use it, only that all malware detection software has limitations. Good malware designers know this and know how to hide their exploits so they don't expose themselves. Your device might be working perfectly well and still have … Continue reading Hammertoss: The Russian Government Malware that Uses Twitter to Steal Information

The Revenge of the Things

There was once a time when the things in our homes were stupid. In the evenings of those bygone days, the family would gather together to stare at the television as it sat sullenly in the corner of the room. Occasionally, one family member, often the father, would walk over and give it a smack … Continue reading The Revenge of the Things