Shenmue 3 announcement - E3 2015 Sony Conference - People are crying in the audience. Real tears.

Happy anniversary to Dreamcast…and its scams

On the 20th anniversary of Dreamcast, we take a trip down memory lane; specifically, years of scams tied to the beloved console. Categories: Cybercrime Social engineering Tags: dreamcastgamesgamingscamsSEGAshenmuevideogames (Read more...) The post ...
The Modern Day Hacker – A Cautionary Tale

The Modern Day Hacker – A Cautionary Tale

J0hn_D0ugh$ – So there I was once again enjoying my victory. I wasn’t technically done yet, however all of the hard stuff had already been done. I’m not a hacker just for ...
Bromium-Protection-Against-Business-Email-Compromise

Protecting your Enterprise from Business Email Compromise

Business Email Compromise (BEC) is a growing threat that has resulted in companies losing billions of dollars since 2013 BEC starts with spear phishing and traditional attacks to install spyware Bromium prevents ...
Privacy Policies: The Realm Of The Legible Word Salad by Chris Boyd

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies ...
Fake Malwarebytes helpline scammer caught in the act

Fake Malwarebytes helpline scammer caught in the act

In this blog, we take you through a phone call to a fake Malwarebytes helpline run by Blue Eye Ventures, and show you how to spot the scam in action. Categories: Cybercrime ...
Vendors, Educating, and Social Media Marketing

Vendors, Educating, and Social Media Marketing

What do professionals inadvertently disclose about the operations security (OPSEC) of their organizations and themselves while giving advice? Becoming a known educator and voice in your area of expertise is effectively done ...
Further sharing of signals across the Intelligent Security Graph

Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few ...
Netflix phish claims your membership is on hold

Netflix phish claims your membership is on hold

We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information. Categories: ...
Shoppers Stop tech scam draws from thousands of forced ad injections

Shoppers Stop tech scam draws from thousands of forced ad injections

The same group behind the Shoppers Stop tech scam campaign is at it again, injecting malicious ad code into thousands of sites and redirecting to a templated warning page. Categories: Social engineering ...
Loading...