Breaking things and wrecking up the place since 2005.
January 3, 2020 - Most get-rich-quick schemes on the Internet prove to be scams in disguise—and that includes buying drugs. Learn how scammers take advantage of users looking for illegal activities online.
November 26, 2019 - We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of...
October 11, 2019 - Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.
September 9, 2019 - Before organizations engage in gnashing of teeth over the "ignorant user" and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves.
July 10, 2019 - As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.