We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…
Emotet starts a new week of malicious spam by promising a copy of Edward Snowden’s new book.
After months of laying dormant, the notorious Emotet is back, with its botnet spewing spam globally.
If your organization doesn’t have an anti-phishing plan in place, it’s time to start thinking about one. Here’s what to tell your employees and customers about phishing attacks.
The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?
US telecommunications companies have the technology to protect customers against the rising tide of unwanted calls—they just haven’t done it yet. So it’s up to lawmakers and consumers themselves to fight back against phone spampocalypse. Here’s how they’re doing it.
We take a look at some of the safe ways to waste a spammer’s time, whether by email or telephone.