3 Ways Data Breaches Accelerate the Fraud Supply Chain
October 5 2020The battle's just beginning as bad actors glean more personal information from victims and use that data to launch larger attacks.
Read moreThe battle's just beginning as bad actors glean more personal information from victims and use that data to launch larger attacks.
Read moreLast week, we said that "Friends don't let friends get scammed." They don't let themselves get scammed, either!
Read moreAt Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.
Read moreReview of a squid-related children’s book. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreAn IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.
Read moreJames Jackson was convicted of mail fraud, aggravated identity theft, access device fraud, and theft of mail last year.
Read more
Note: This isn’t my usual essay topic. Still, I want to put it on my blog.
Six months into the pandemic with no end in sight, many of us have...
Read moreOver the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot, an enormous collection of more than two million malware-infected Windows PCs...
Read moreThousands of Emotet emails contain a message body pulled directly from the Democratic National Committee website, researchers report.
Read moreFeeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments