Scamming, Spying, and Stalking Using Call Forwarding

I don't use call forwarding and, because of this, I'd be a perfect target for the call forwarding scam. So, if you know nothing about call forwarding, read this post or become a victim. It's as simple as that. Call forwarding is a useful service. If, for example, you want calls forwarded from your office … Continue reading Scamming, Spying, and Stalking Using Call Forwarding

Russia’s AcidRain Malware Destroys Satellite Receivers across Europe

Russia began its war on Ukraine with a series of wiper malware attacks. Wiper attacks simply want to make a device inoperable by destroying its boot sector. It's basically an offensive cyber weapon. As of this writing, there have been seven separate wiper malware variants identified. Among these was one which targeted Viasat modems. The … Continue reading Russia’s AcidRain Malware Destroys Satellite Receivers across Europe

Hackers Exploit Link Hovering to Steal Login Credentials

GoogIe, goog1e, goog/e, goog|e, G00gle, google, and google, are not Google. They are variations that hackers sometimes use to hide the name of the real site they want you to visit, because, when they get you there, they can take advantage of their ploy to steal your Google login credentials. In the Edge browser: GoogIe … Continue reading Hackers Exploit Link Hovering to Steal Login Credentials

Taking Your Cyberattacks on Russia to the Next Level

Congratulations to those of you who participated in the DDoS attacks that I reported on in my last post. They created numerous headlines like the following from Quartz. The attack vectors I reported on are still doing their job of keeping government, military, and media websites offline. However, some people may want to do more, … Continue reading Taking Your Cyberattacks on Russia to the Next Level

You Can Fight Russia from the Comfort of Your Home… Yes, This Means You

There was a time when only able-bodied men were asked to fight in wars; well, not anymore. Now you can fight Russian aggression no matter what your age or physical condition may be. You could be 100 years old and blind and still play a part because this war is not the same as the … Continue reading You Can Fight Russia from the Comfort of Your Home… Yes, This Means You

Fake Ukraine Charity Scams Taking Their Toll

The more emotional the crisis, the more scammers will use it to generate money for themselves. People are basically good and want to help those in need. At such times,they tend to let their emotions guide them. The emotions targeted by scammers in this tsunami of Ukrainian-based phishing emails are sympathy and anger. These are … Continue reading Fake Ukraine Charity Scams Taking Their Toll

From the Front Lines of the Cyberwar

The battle in cyberspace is so heated that this post can only capture some of the major developments. Most of the information given here is found on deep web sites, hacker forum sites, or sites dedicated to hacking and cybersecurity, most of which are not frequented by mainstream media. Most of the cyber attacks against … Continue reading From the Front Lines of the Cyberwar

Ukrainian and Russian Hacking Groups Battle For Control

As a disclaimer, I should note that I am writing this from a location in Poland only an hour from the Ukrainian border. This being the case, the events unfolding in this area of the world may influence the tone of this post. Under the circumstances, I find this unavoidable and, possibly, necessary. As I … Continue reading Ukrainian and Russian Hacking Groups Battle For Control

Dissecting the Data Leak that Undermined the Trucker Convoy

GoFundMe blocked all donations to the Freedom Convoy 2022 fundraiser because "we now have evidence from law enforcement that the previously peaceful demonstration has become an occupation, with police reports of violence and other unlawful activity." This left the $10 million that was already raised on the site in limbo. At first, GoFundMe thought it … Continue reading Dissecting the Data Leak that Undermined the Trucker Convoy

How Stylometry is Used to Undermine Your Online Anonymity

For a number of reasons, some people value remaining anonymous while online. Experts in the field often give such people a list of ways to attain this goal. Among the most common suggestions are, use a VPN, use encrypted messaging apps, use the Tor browser, use secure or temporary email, and don't use Google. There … Continue reading How Stylometry is Used to Undermine Your Online Anonymity