Fake Ukraine Charity Scams Taking Their Toll

The more emotional the crisis, the more scammers will use it to generate money for themselves. People are basically good and want to help those in need. At such times,they tend to let their emotions guide them. The emotions targeted by scammers in this tsunami of Ukrainian-based phishing emails are sympathy and anger. These are … Continue reading Fake Ukraine Charity Scams Taking Their Toll

From the Front Lines of the Cyberwar

The battle in cyberspace is so heated that this post can only capture some of the major developments. Most of the information given here is found on deep web sites, hacker forum sites, or sites dedicated to hacking and cybersecurity, most of which are not frequented by mainstream media. Most of the cyber attacks against … Continue reading From the Front Lines of the Cyberwar

Ukrainian and Russian Hacking Groups Battle For Control

As a disclaimer, I should note that I am writing this from a location in Poland only an hour from the Ukrainian border. This being the case, the events unfolding in this area of the world may influence the tone of this post. Under the circumstances, I find this unavoidable and, possibly, necessary. As I … Continue reading Ukrainian and Russian Hacking Groups Battle For Control

Dissecting the Data Leak that Undermined the Trucker Convoy

GoFundMe blocked all donations to the Freedom Convoy 2022 fundraiser because "we now have evidence from law enforcement that the previously peaceful demonstration has become an occupation, with police reports of violence and other unlawful activity." This left the $10 million that was already raised on the site in limbo. At first, GoFundMe thought it … Continue reading Dissecting the Data Leak that Undermined the Trucker Convoy

How Stylometry is Used to Undermine Your Online Anonymity

For a number of reasons, some people value remaining anonymous while online. Experts in the field often give such people a list of ways to attain this goal. Among the most common suggestions are, use a VPN, use encrypted messaging apps, use the Tor browser, use secure or temporary email, and don't use Google. There … Continue reading How Stylometry is Used to Undermine Your Online Anonymity

Infrastructure Attacks on Ukraine and its Western Allies may Precede an Invasion

Update: This just in from Reuters. Ukraine reports cyber attack on defence ministry website, banks Three weeks before Vladimir Putin sent Russian troops into Georgia in August of 2008, the Russian government launched a massive cyber attack. The first attack was a DDoS (Distributive Denial of Service) attack on the Georgian president's website. It succeeded … Continue reading Infrastructure Attacks on Ukraine and its Western Allies may Precede an Invasion

Disappearing Backups May Be the First Sign of a Ransomware Attack

Some ransomware groups pretend to be nice guys. Sure, they are out to make money by stealing data from big companies and holding it for ransom, but they say they will not attack hospitals and critical infrastructure. Well, it's far more likely that they chose this 'humanitarian' crime path not because of some misguided sense … Continue reading Disappearing Backups May Be the First Sign of a Ransomware Attack

Criminals Upgrade Amazon Email Scams

Yes, I know. Amazon phishing emails have been around since Amazon first started selling merchandise online. But when I see emails making it into my inbox, I realize that there's been another upgrade in the scammers' phishing arsenal. There are several versions of this new campaign and I was lucky enough to see all of … Continue reading Criminals Upgrade Amazon Email Scams

The Poisoned Handshake: Using Fake Cell Towers to Manipulate Cell Phone Networks

When you are on the move, your cell phone automatically detects the signal from the nearest tower. Tower signals may overlap but the strength of their signals will not be uniform and there are occasional dead spots where you can lose a signal completely. Cell phones are designed to seek out the strongest signal. This … Continue reading The Poisoned Handshake: Using Fake Cell Towers to Manipulate Cell Phone Networks

Hackers Turn off Google Play Protect to Install Banking Malware

When you get a new Android phone, you get a pre-installed version of Google Play Protect. From a cybersecurity viewpoint, that's good. You want as many barriers between you and cyber criminals as you can get. By default, Google Play Protect is always active. In principle, Play Protect checks any app you download from the … Continue reading Hackers Turn off Google Play Protect to Install Banking Malware