Scammers Use Messages from YouTube Celebs to Gather Personal Information

Imagine getting a friend request from your favorite YouTube celebrity. Of course, you might be skeptical. However, when you check the request out, it seems real and actually comes from the account of that celebrity. Here is an example that I put together to show what the request would look like. Even if you may … Continue reading Scammers Use Messages from YouTube Celebs to Gather Personal Information

“Love You” Phishing Emails Arrive in Time for Valentine’s Day

Curiosity kills the spam email recipient. Promises of wealth or romance written into a subject line can be difficult to ignore, simply out of curiosity. "Maybe Citibank did find some money that they owed me." "Maybe those Russian women really do want to meet me." Sure. The current spam email that is building its curiosity … Continue reading “Love You” Phishing Emails Arrive in Time for Valentine’s Day

The Business Process Compromise: The Cyber Attack You Don’t See Coming

One day, a shipping container of bananas disappeared in Belgium. Workers at the port of Antwerp couldn't figure out what was going on. And it wasn't only containers of bananas that were disappearing. Other containers of normal cargo suddenly were not where they were supposed to be when trucks came to get them. The records … Continue reading The Business Process Compromise: The Cyber Attack You Don’t See Coming

Cyber Insurance Firms Fund Malware Development

For any company, establishing sound cybersecurity architecture is an expensive venture. Building a professional IT department with a qualified staff is just one of the many expenses that must be taken into account. Upgrading a network with new devices, new software and new protocols are other concerns. Add to all of this the retraining of … Continue reading Cyber Insurance Firms Fund Malware Development

Why Fake Conference Scams Continue to be So Effective

Good scams work because they don't look like scams. It's that simple. Many professional scammers have been around for a long time. Like all good professionals, they've learned from their mistakes. That's why scams continue to claim victims. Scammers know their own weak points and, over the years, have shored them up. They have learned … Continue reading Why Fake Conference Scams Continue to be So Effective

F.B.I. Uses Tor Browser to Identify CEO Scammers

The architecture of the Tor Browser confuses almost everyone. So, at the risk of seeming ridiculous, I will attempt to oversimplify how Tor works so that I can explain how the F.B.I. can use it as an NIT (Network Investigative Technique) tool. Okay, imagine that web surfer, Joe, wants to visit a particular website. He … Continue reading F.B.I. Uses Tor Browser to Identify CEO Scammers

Cyber Attacks Now Listed as 6th Most Likely Risk for Economic Collapse

Planet Earth can now be correctly described as a constellation of interacting and interdependent big cities. Hence, anything that harms the economic underpinnings of one of these cities disrupts the economy of the entire planet. The University of Cambridge has recently assessed what the greatest economic threats to Planet Earth are for 2019. Rising quickly … Continue reading Cyber Attacks Now Listed as 6th Most Likely Risk for Economic Collapse