Tennessee Man Sentenced to 17 Years in Federal Prison for Identity Theft and Fraud

Tennessee Man Sentenced to 17 Years in Federal Prison for Identity Theft and Fraud

James Jackson, a 58-year-old resident of Memphis, Tennessee, has been sentenced to 17 years in federal prison for 13 counts of mail fraud, aggravated identity theft, access device fraud and mail theft ...

The Big Twitter Hack, Critical Windows DNS Server Update, Email Impersonation Attacks

In episode 130 for July 20th 2020: Details on the big Twitter hack which took over high-profile accounts, a major wormable critical vulnerability in Microsoft Windows DNS Server, and how email impersonation ...

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...
#VoCo. Adobe Audio Manipulator Sneak Peak with Jordan Peele | Adobe Creative Cloud

Deepfakes: How to Defend Yourself from Attack

Deepfake attacks - anyone who has a presence on social media is vulnerable. Find out how you can defend yourself and your company against them in latest blog, "Deepfakes: How to Defend ...
direct deposit scams

Direct Deposit Scams: Don’t Get Fooled!

Direct deposit scams are widely prevalent and affect industries in all sectors. Find out how to protect your company in our April blog, "Direct Deposit Scams: Don't Get Fooled!" ...
How phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreet

COVID-19 and Amygdala Hijacking in Cyber Security Scams

COVID-19 scams target our heightened sense of fear and anxiety. It's known as amygdala hijacking. In this blog, you'll find out how to see through the scam. The post COVID-19 and Amygdala ...
Fear as part of my pretext

Is It Legit to Use Fear as Part of My Pretext?

One question I get asked often is, “Chris, isn’t it legit to use fear as part of my pretext in a social engineering exercise? I mean, after all, the bad guys are ...

New SHA-1 Attack

There's a new, practical, collision attack against SHA-1: In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack. We ...

Attacking Soldiers on Social Media

A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power ...