The Business Process Compromise: The Cyber Attack You Don’t See Coming

One day, a shipping container of bananas disappeared in Belgium. Workers at the port of Antwerp couldn't figure out what was going on. And it wasn't only containers of bananas that were disappearing. Other containers of normal cargo suddenly were not where they were supposed to be when trucks came to get them. The records … Continue reading The Business Process Compromise: The Cyber Attack You Don’t See Coming

Cyber Insurance Firms Fund Malware Development

For any company, establishing sound cybersecurity architecture is an expensive venture. Building a professional IT department with a qualified staff is just one of the many expenses that must be taken into account. Upgrading a network with new devices, new software and new protocols are other concerns. Add to all of this the retraining of … Continue reading Cyber Insurance Firms Fund Malware Development

Why Fake Conference Scams Continue to be So Effective

Good scams work because they don't look like scams. It's that simple. Many professional scammers have been around for a long time. Like all good professionals, they've learned from their mistakes. That's why scams continue to claim victims. Scammers know their own weak points and, over the years, have shored them up. They have learned … Continue reading Why Fake Conference Scams Continue to be So Effective

F.B.I. Uses Tor Browser to Identify CEO Scammers

The architecture of the Tor Browser confuses almost everyone. So, at the risk of seeming ridiculous, I will attempt to oversimplify how Tor works so that I can explain how the F.B.I. can use it as an NIT (Network Investigative Technique) tool. Okay, imagine that web surfer, Joe, wants to visit a particular website. He … Continue reading F.B.I. Uses Tor Browser to Identify CEO Scammers