Category Archives: Uncategorized

Chinese State Hackers are Actively Recruiting Corporate Insiders

The F.B.I began October, 2018, by putting out a plea to U.S. companies: Work with us to stop malicious insiders from stealing your secrets and sending them to foreign competitors. To be more specific, stop China from infiltrating your company … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Magecart Malware Steals Credit Card Data from Legitimate Online Payment Forms

Traditional credit card skimmers are physical devices attached to or overlain on ATMs or other credit card terminals. These are still around and some, like the overlay skimmer below which was reported on by Brian Krebs, are quite sophisticated. Once … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Review Bombing: New Extortion Scam Threatens Businesses with Negative Reviews

If you’re like most people, you probably read the reviews of a hotel or restaurant before you visit it for the first time. After all, you don’t want to spend your money on an experience you may be disappointed with, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Would You Pay $800,000 for Virtual Land? Someone Did

For some, the harsh reality of daily life becomes too much. Some choose to leave this world to go to a better place. That place is called, Decentraland. This is a land where “you can create unique experiences unlike anything … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Forget the One-Day Exploit, Beware the One-Hour Exploit

A recent report by the United States Government Accountability Office (GAO) details how one of the largest personal information hacks in history was designed. The hack described was the one on Equifax, a credit reporting agency (CRA) that exposed the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

GMail Confidential Really Isn’t, But It Has Its Uses

Many of you reading this have had your Gmail account updated. The update contains a few extra features and a new look, but I would like to focus on one feature that may have escaped your attention. This is the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

The Recent DNC Hack that Wasn’t… Or Was It?

Penetration testing, or pentesting, can be a useful strategy for an enterprise to use to tighten security on its network. Paying an ethical hacker to find holes in a company’s cybersecurity architecture can help a company avoid a major breach. … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment