Monthly Archives: June 2018

Using Ultrasound to Hack Air-Gapped Computers

Air-gapped computers are computers that are not connected to any network. They may even be physically isolated. Such computers are usually presumed to be safe from cyber manipulation. For this reason, businesses or organizations will often store important data on … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Fake Lawyers and Law Firms Scam Multiple Victims in Multiple Ways

When I started investigating this problem, I thought I might find a few fake law firms being used as fronts to perpetrate fraud. I now realize that I profoundly underestimated how widely this attack vector is being used. In fact, … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Trending: Hacking School Networks to Change Grades

Have you noticed a sudden increase in your son’s or daughter’s grades? Do you wonder how they can do so well at school when they seem to spend most of their time playing online games? Well, maybe there’s a simple … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment