How costly are sweetheart swindles?

And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year Last week, as couples all over the world celebrated Valentine’s Day, we highlighted the risks of romance fraud. Even with V-Day safely behind us, it’s important to remain on high alert for online […]

Read more
Colorful Typographic Experiments

Share this: There have been some interesting, boundary-pushing typography-related experiments lately. I was trying to think of a joke like “somethings in the descenders” but I just can’t find something that will stand on its own leg without being easy to counter. Codrin Pavel created a fascinating multi-color typeface called CSSans. It’s not a “font”, […]

Read more
Cyber Security Today: Feb. 20, 2019 — Third pile of stolen usernames and passwords revealed, an instant messaging scam and a university web site problem

Another multi-million pile of stolen usernames and passwords for sale on the underground web, an instant messaging scam and a university web site problem. Welcome to Cyber Security Today. It’s Wednesday February 20th. To hear the podcast click on the arrow below: A third cache of stolen personal data has appeared on the dark web, […]

Read more
The Anatomy of a Lazy Phish

A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site. Phishing is one of the most effective ways hackers can compromise a network. Instead of requiring the skills and time to target specific organizations, perform reconnaissance, discover vulnerabilities, and select attack […]

Read more
Siegeware: When criminals take over your smart building

Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities Imagine you are the person in charge of operations for a property company that manages a dozen buildings in a number of cities. What would you do if […]

Read more
Ryuk, Exploring the Human Connection

In collaboration with Bill Siegel and Alex Holdtman from Coveware. At the beginning of 2019, McAfee ATR published an article describing how the hasty attribution of Ryuk ransomware to North Korea was missing the point. Since then, collective industry peers discovered additional technical details on Ryuk’s inner workings, the overlap between Ryuk and Hermes2.1, and […]

Read more
IBM’s quantum system explained – All Hands on Tech

IBM Q System One is “The world’s first fully integrated universal computing system,” according to Big Blue. Its purpose is to get quantum computing out of the research lab and into a commercial environment. Since 2017, IBM has been working on the design elements around its quantum chips. Having the qubits is one thing, but […]

Read more
MWC 2019: The Key to Establishing Digital Trust with Intelligent Connectivity

These days, it’s rare to walk into a home that doesn’t have a smart device in use. From voice assistants, smart TVs, tablets, and more, these devices have greatly enhanced our way of life through intelligent connectivity. Intelligent connectivity is defined by the highly contextualized and personal experiences offered by the smart devices we utilize […]

Read more
Top