If you’ve used the internet for anything, you’ve probably been faced with CAPTCHA, otherwise known as the Completely Automated Public Turing test to tell Computers and Humans Apart.
The pandemic lockdown that forced us all to work-from-home was a true shock to the system for most people who hadn’t worked a full day via videoconferencing.
Dr. Suess created that grey fuzzy-haired creature many years ago, the Grinch, who stole Christmas. While not quite as cute and fuzzy as the Grinch, today’s cybercriminals are posing as a similar sounding nefarious activity, the Glitch.
After reading the recent FBI report on the state of email related cybercrime in 2022, one statistic popped out at me, when correlating different parts of the report related to Business Email Compromise and Ransomware.
We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).
Remember that classic book from high school English class, Animal Farm by George Orwell? (This is when the teacher droned on about what an ‘allegory’ was 😊.) Even if you don’t remember, there’s a famous bit where one of the anthropomorphized sheep says, “four legs good, two legs baaad.” What he means is that you should trust the animal that is more sturdy—that sheep don’t teeter and wobble like those unruly two-legged humans.
A quick program note for our regular readers: we’re interrupting our scheduled series on the best-in-class, scalable eSignature software that is RSign so that we can address some important current economic events…
Guess which of these conspiracy theories is actually true. This article is the fourth and final of a series devoted to Email Eavesdropping™ threat hunting.
RMail’s heartbeat monitor is like having your own email secret service patrolling your inbox. Previously on Tech Essentials, we let you live through, in chilling detail, a sophisticated email scam that originated with an email exchange that was eavesdropped on by a cybercriminal gang. In retrospect, the most sophisticated aspect of the scam was the […]
You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.
December 08, 2023
December 01, 2023
November 24, 2023
November 17, 2023
November 10, 2023