

New Scams July 2019
Government Imposter Scams We have all received calls or emails purporting to be from some government agency like the social security...


New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...


Hacked or Spoofed?
Do you know the difference? You may have seen a friend request on Facebook from someone you know and had thought you were already friends...


Most Popular Cyber Scams
Cyber scams and online fraud continue to evolve. Law enforcement and cybersecurity professionals try to prevent online fraud by...


Hacking and Applied Hacking to Biology
Hack into hotel network though Hotel TVs. You can also watch what other guest are watching in their rooms. Hacking wireless auto keys to...


Book Reviews Q1 2018
My recent reading list has included a number of good titles that may in some way relate to cybersecurity. I freely admit that I am in...


12 DEC 2017 Security Update
In this issue will will cover recent news topics in cyber security. #Security #Antimalware #Malware #Hacker #Hacking #Cybercrime...

Combat Revenge Porn
I would start this off in the category of the bizarre. Facebook wants nude photos of you. On the face of it, it sounds bizarre. ...


Implementation Flaws
Often we find flaws in the implementation of technologies. Once the flaws are found we think companies will work to correct those flaws. ...


New Attack Techniques 2017
The Seven Most Dangerous New Attack Techniques, and What's Coming Next "Moderator: Alan Paller, Research Director and Founder, SANS...