The United States government has been known to take a stand of ‘we don’t negotiate with terrorists’ when it comes to discussions of ransom. Whether this has 100% certainty to it can be argued in more ways than...
And so, the season starts. Which one is it that we’re referring to? Cyber Monday, Black Friday, Prime Day…all of these sales tend to lean towards exceptional deals on electronics, and today that means the...
Business Email Compromise (BEC) is not a new term. What is it? BEC is when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person. Sometimes...
We are past the point of whether or not working remotely, or from home, is something we are unsure of. It is likely our permanent setup, or at the very least, a long term one that we need to move forward with and in...
Hidden text, also known as zero font, allows a malicious email to bypass email security platforms by using invisible characters in between the letters of an email. They are often used to establish the legitimacy of...
We don’t often think of cybercriminals as businesspeople. We tend to think they are individuals lurking about in hoodies in their basement. Quite the opposite – or so we have found through investigations and the...
Was it made of gold? Encrusted in diamonds? No. Read on to learn how one laptop ended up being worth a massive one million dollars.
It should hardly come as a surprise to anyone that cybercriminal activity has surged in 2020. By May of this year, the number of reported attacks had already come close to the total for 2019 according to the federal...
It’s always nice to get a postcard from friends or family who are away on vacation. But this week we learned of a new kind of postcard being sent out with not-so-well wishes.