Kaspersky says that fake exchanges, fake mining hardware and wallet phishing are the most popular crypto scams of the year, many of which it said have a higher-than-usual level of detail.
Security is a big part of Windows 11, but so is delivering productivity and a good experience with all the security features turned on.
Original release date: July 2, 2021
CISA is taking action to understand and address the recent supply-chain ...Continue Reading →
The Invention of the Typewriter
On June 24, 1868, Christopher Latham Sholes received a patent for something he called a “Type-Writing Machine.” The early tech resembled a piano and had 21 keys.
Continue Reading →
Trend Micro case study explains how the new business model works and how the multistep attacks unfold. A must read.
Continue Reading →
The Colonial Pipeline ransomware saga continues to unfold before our eyes. This week, company CEO Joseph Blount admitted to paying $4.4 million in ransom to cybercriminals following the attack that shut down the largest fuel pipeline in the U.S. In an interview with the Wall ...Continue Reading →
And the beat goes on. As researches discover more about the SolarWinds and Exchange exploits, the discovery of similar related attacks was inevitable.
Original release date: April 2, 2021
The Federal Bureau of Investigation (FBI) and CISA have released a Joint Cybersecurity Advisory (CSA) to warn ...Continue Reading →
This is reprinted from an email I received from the Libertarian Party on Monday August 24th.
Cryptocurrency has been on an historic run in recent days, reaching heights not seen in years and positioning itself as a hedge against economic uncertainty to rival more traditional safe harbors like gold and silver. As central banks continue printing off ream after ream of fiat currency, ...Continue Reading →
Original release date: September 8, 2019
U.S. Cyber Command has released 11 malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA ...Continue Reading →
Is your company moving operations to the cloud? What about the cybersecurity aspects of protecting your data assets in the cloud? Are you relying on your partner/vendor to take care of securing your information? In light of the Paige Thompson indictment, it is apparent that relying too heavily on your vendor’s expertise and staff can open ...Continue Reading →
Paul Calder Le Roux, a brilliant South African software programmer who ran the most successful and largely legal opioid marketing networks called RX Limited, and morphed into running a huge illegal international drugs and arms dealing empire that has ever been seen. Since his arrest in 2012, he has been spending time in the custody of the DEA, ...Continue Reading →