Breaking things and wrecking up the place since 2005.
May 22, 2020 - There's been a lot of talk recently about encryption and how law enforcement can't convict criminals without encryption keys. We beg to differ.
March 11, 2020 - How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting.
January 30, 2020 - Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.
January 3, 2020 - Most get-rich-quick schemes on the Internet prove to be scams in disguise—and that includes buying drugs. Learn how scammers take advantage of users looking for illegal activities online.
November 26, 2019 - We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of...
Select your language