William Tsing

Breaking things and wrecking up the place since 2005.

January 28, 2019 - Do you know what companies can do after you click "ok" and consent to tracking? When you check that box, are you sure you know which data can be tracked and where? We look at social media platforms and explain their user agreements and data tracking habits.

CONTINUE READINGNo Comments

January 16, 2019 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

CONTINUE READINGNo Comments

October 25, 2018 - Yes, those sextortion email scams using old passwords are still making the rounds. How can you spot a real sextortion attempt from an empty threat? And when should you report to authorities? Read on to find out.

CONTINUE READINGNo Comments

September 25, 2018 - Safari has begun blocking legacy extensions installed from outside the Extensions Gallery. Unfortunately, implementation of this policy has been abrupt, with little explanation for users on why their extensions are being yanked. Let's look at how Apple's new policy and how its application impacts security.

CONTINUE READINGNo Comments

August 24, 2018 - Most online scams depend on two things: a legitimate entity that has a complicated or broken process, and a desperate target population. With immigration, you get both, which results in an environment ripe for green card scams.

CONTINUE READINGNo Comments

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language