It’s Hacking Season in Tibet

As of this writing, the website for the Tibetan government in exile, the Central Tibetan Administration (CTA), appears to be under attack. This is nothing unusual. About this time every year the CTA, and other organizations connected to it, endure a variety of cyber attacks. According to Tenzin Dalha, a researcher at the Tibet Policy … Continue reading It’s Hacking Season in Tibet

5 Surprising and mostly Unknown Cyber Security Facts

5. Most Hackers Target Small Businesses Cyber attacks are always in the news, but usually only when they hit large companies or organizations. Yet, how many people know that hackers prefer to target small businesses? According to a recent report from Hiscox, "Forty‑seven percent of small businesses suffered at least one cyber attack in the … Continue reading 5 Surprising and mostly Unknown Cyber Security Facts

Scammers Use Messages from YouTube Celebs to Gather Personal Information

Imagine getting a friend request from your favorite YouTube celebrity. Of course, you might be skeptical. However, when you check the request out, it seems real and actually comes from the account of that celebrity. Here is an example that I put together to show what the request would look like. Even if you may … Continue reading Scammers Use Messages from YouTube Celebs to Gather Personal Information

“Love You” Phishing Emails Arrive in Time for Valentine’s Day

Curiosity kills the spam email recipient. Promises of wealth or romance written into a subject line can be difficult to ignore, simply out of curiosity. "Maybe Citibank did find some money that they owed me." "Maybe those Russian women really do want to meet me." Sure. The current spam email that is building its curiosity … Continue reading “Love You” Phishing Emails Arrive in Time for Valentine’s Day

The Business Process Compromise: The Cyber Attack You Don’t See Coming

One day, a shipping container of bananas disappeared in Belgium. Workers at the port of Antwerp couldn't figure out what was going on. And it wasn't only containers of bananas that were disappearing. Other containers of normal cargo suddenly were not where they were supposed to be when trucks came to get them. The records … Continue reading The Business Process Compromise: The Cyber Attack You Don’t See Coming

Cyber Insurance Firms Fund Malware Development

For any company, establishing sound cybersecurity architecture is an expensive venture. Building a professional IT department with a qualified staff is just one of the many expenses that must be taken into account. Upgrading a network with new devices, new software and new protocols are other concerns. Add to all of this the retraining of … Continue reading Cyber Insurance Firms Fund Malware Development

Why Fake Conference Scams Continue to be So Effective

Good scams work because they don't look like scams. It's that simple. Many professional scammers have been around for a long time. Like all good professionals, they've learned from their mistakes. That's why scams continue to claim victims. Scammers know their own weak points and, over the years, have shored them up. They have learned … Continue reading Why Fake Conference Scams Continue to be So Effective