January 28, 2019 - Do you know what companies can do after you click "ok" and consent to tracking? When you check that box, are you sure you know which data can be tracked and where? We look at social media platforms and explain their user agreements and data tracking habits.
January 16, 2019 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.
October 25, 2018 - Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.
September 25, 2018 - Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let's look at how Apple's new policy and how its application impacts security.
August 24, 2018 - Most online scams depend on two things: a legitimate entity that has a complicated or broken process, and a desperate target population. With immigration, you get both, which results in an environment ripe for green card scams.