World’s Largest Supercomputers Team Up to Find a COVID-19 Vaccine

If you are new to the world of viruses, you might be wondering why you'd use a supercomputer to solve a medical problem. Is this all for show? Are IBM, Amazon, Google, Microsoft, and others just doing this as some sort of marketing ploy? Isn't using the largest computers on Earth to investigate a tiny … Continue reading World’s Largest Supercomputers Team Up to Find a COVID-19 Vaccine

Sugarcoated Romance Scams: Sugar Daddies, Sugar Mamas, and Sugar Babies caught in a Web of Scams

"A young woman has admitted trying to blackmail a 'sugar daddy' during a sexual rendezvous at her mother's house before he was attacked by two men with a tomahawk after a dispute over payment." So reads a recent story from the U.K. Not really the best date, but, what did this guy expect from a … Continue reading Sugarcoated Romance Scams: Sugar Daddies, Sugar Mamas, and Sugar Babies caught in a Web of Scams

Man-in-the-Browser Steals Your Bank Account

I personally don't use any smartphone banking apps. I guess I just know too much about how easily they can be hacked. Sure, maybe your bank will compensate you for any lost funds, but that isn't guaranteed. A lot depends on how quickly you report the loss. They may even decide that your behavior was, … Continue reading Man-in-the-Browser Steals Your Bank Account

A Free USB from Best Buy: The Gift that Keeps On Taking

When you get a free gift in the mail from Best Buy, you may be forgiven for being suspicious. Sure, maybe you shopped there before, and maybe you even bought a laptop there a few years back, but did this really qualify you for a free $50 gift card? Soon, however, rationalization sets in because … Continue reading A Free USB from Best Buy: The Gift that Keeps On Taking

Unity and Opportunism in the Time of Coronavirus

As Shakespeare noted, "Adversity makes strange bedfellows." So it is in the Time of Coronavirus. Who would have thought that cybersecurity firms would have the same goals as hackers? Some cybersecurity firms have agreed to offer their services free to hospitals and healthcare workers while they battle COVID-19. At the same time, some major ransomware … Continue reading Unity and Opportunism in the Time of Coronavirus

Stalkers Get a New Weapon: Stalkerware 2.0

"Stalking is when two people go for a long romantic walk together, but only one of them knows about it.". Stalking, in many places, is a crime. But it is not a crime to install stalkerware on someone's smartphone. Why is this? Because no developer ever names such applications 'stalkerware'. Naming them as such would … Continue reading Stalkers Get a New Weapon: Stalkerware 2.0

Coronavirus Tracking App is Actually Phone-Locking Ransomware

As the coronavirus panic intensifies, it's only natural for people to become desperate to learn if anyone in their immediate area has contracted the disease. It's just as natural for them to welcome an app that promises to keep them updated on the latest COVID-19 news. And that's exactly what the COVID-19 Tracker promises. In … Continue reading Coronavirus Tracking App is Actually Phone-Locking Ransomware

Coronavirus Phishing Scams Begin Targeting Corporations

The first coronavirus phishing scams were pretty obvious. Mostly, they hoped to trick people into visiting sites that the emails claimed offered special treatments or gave out some sort of secret information. In fact, most such emails were captured by spam filters. Now, however, as the virus spreads throughout the world and more people become … Continue reading Coronavirus Phishing Scams Begin Targeting Corporations

The Hacking of the Agency Protecting White House Communications: Some Speculations

Recently, the Defense Information Systems Agency (DISA) indirectly announced that it had been hacked. We learned of this through letters that were sent to 200,000 potential victims in which it was stated that their personal information may have been stolen. No, it was not recently stolen. It was stolen sometime between May and July of … Continue reading The Hacking of the Agency Protecting White House Communications: Some Speculations

Identifying Potential Malicious Insiders

All insider threats are not created equal, however, all can do equal amounts of damage to a company or organization. I have written on this topic before in relation to the F.B.I.'s IDLE program, which was begun to help companies find malicious insiders. In this post, I want to focus more on the insiders themselves, … Continue reading Identifying Potential Malicious Insiders