William Tsing

Breaking things and wrecking up the place since 2005.

May 22, 2020 - There's been a lot of talk recently about encryption and how law enforcement can't convict criminals without encryption keys. We beg to differ.

CONTINUE READINGNo Comments

March 11, 2020 - How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting.

CONTINUE READINGNo Comments

January 30, 2020 - Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

CONTINUE READINGNo Comments

January 3, 2020 - Most get-rich-quick schemes on the Internet prove to be scams in disguise—and that includes buying drugs. Learn how scammers take advantage of users looking for illegal activities online.

CONTINUE READINGNo Comments

November 26, 2019 - We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of...

CONTINUE READINGNo Comments

Select your language