Cyber Risk Update 18 NOV 2022
AI Algorithms, Strict Place-of-Work Rules Potential Trouble Spots for Employment Claims “…some of the artificial intelligence tools that...
Spot a Scam
In cybersecurity awareness programs, we try to keep people informed of the latest scams. However, it seems like we are chasing a carrot...
Cisco Router Sextortion Scam
Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco...
New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...
Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...
Tax Identity Theft
Tax season is upon us, and filing a tax return to get a refund in the bank can cause anxiety and excitement at the same time. However, if...
Hacked or Spoofed?
Do you know the difference? You may have seen a friend request on Facebook from someone you know and had thought you were already friends...
Email Flow Rules Help Prevent Scams
A popular attack or threat vector for cybercriminals is to send an email pretending to be from a top-level executive or in the case of...
Most Popular Cyber Scams
Cyber scams and online fraud continue to evolve. Law enforcement and cybersecurity professionals try to prevent online fraud by...
How to Catch a Liar
Here are a few videos about how to catch people who are lying. This is useful if you are an investigator or auditor. Deception is a key...