New Scams July 2019
Government Imposter Scams We have all received calls or emails purporting to be from some government agency like the social security...
New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...
Email Flow Rules Help Prevent Scams
A popular attack or threat vector for cybercriminals is to send an email pretending to be from a top-level executive or in the case of...
Most Popular Cyber Scams
Cyber scams and online fraud continue to evolve. Law enforcement and cybersecurity professionals try to prevent online fraud by...
Scamming a Scammer
One of my students decides to take a call from a scammer. What follows is the conversation and remote connection the scammer takes to...
Hackers Steal Celebrity Plastic Surgery Photos
Hackers Steal Celebrity Plastic Surgery Photos, Demand Ransom (The Young Turks) Hackers are demanding big money to not release plastic...
Implementation Flaws
Often we find flaws in the implementation of technologies. Once the flaws are found we think companies will work to correct those flaws. ...
War on SPAM
Here is some more fun with Spammers and con artists from James Veitch. You should look up the video of him and his roommate as well. ...
What if you Reply to SPAM
This is what happens when you reply to spam email | James Veitch YouTube "Suspicious emails: unclaimed insurance bonds, diamond-encrusted...