Single, Double and Triple Ransomware

Single, Double, and Triple Extortion Ransomware Attacks

Ransomware gangs are increasingly building in additional layers of extortion in their attacks. Introducing double and triple extortion ransomware attacks.
Tarah Wheeler

Freewheeling with Cyber Red Queen Tarah Wheeler

I know this will come as a shock to you, but there’s a “every gender identity you can imagine gap” in cybersecurity.
phishing as a service / phaas

Phishing-as-a-Service: What You Need to Know

Cybercriminals are now offering access to sophisticated phishing toolkits for a fee or a cut of the profits.

Joelle’s Identity Thief Almost Stumps the Chumps

When a credit card Joelle seldom used was compromised, her bank sent her the bill.
NW News Radio

Adam Levin Discusses Oversharing Children’s Info on Social Media with NW...

Adam Levin was featured in a news segment on NW News Radio where he discussed the dangers of oversharing information about children on social...

Adam Levin Shares Tips with CBS New York for Keeping Kids...

Adam Levin highlighted the potential risks involved with sharing photos of children returning to school for a new year in a new segment on...
Andrew Gold

Andrew Gold Investigates A Dark Corner of the Internet

Investigative journalist and podcaster Andrew Gold went to Germany to report on a controversial law.

Adam Levin Talks with KOMO News About Student Loan Forgiveness Scams

Adam Levin discussed how the Biden Administration's recent announcement of forgiveness for some student loans will likely open the door to a set of...
Reader's Digest

Adam Levin Talks Zelle Scams with Reader’s Digest

Adam Levin recently shared tips with Reader's Digest about the cybersecurity risks of using Zelle for peer-to-peer payments. Check out the article here.
Caitlin Brodnick

Caitlin Brodnick Sees Pro Wrestlers on Her Reality TV

Caitlin Brodnick of the ScamWow podcast joins What the Hack to talk about the real scams of reality television.
Personal Privacy Audit

How to Do a Personal Privacy Audit

While the management of your online reputation is a personal choice, completing a personal privacy audit is essential to protect against both “real world” crime and cybercrimes.
Dara Starr Tucker

Dara Starr Tucker Sees Right Through a Scam

Real estate scams are everywhere. But what Dara Starr Tucker uncovered wins this week’s Cyber Compromise Darwin Award.
Out of office

Out of the Office? How to Avoid OOO Phishing Attacks

Out of Office notifications are a good way to let people know you’re not available to respond to emails. They’re an even better way for hackers to gain admission to your organization.
Ann Cavoukian

Ann Cavoukian Fights For Your Right to Privacy

When it comes to privacy, Ann Cavoukian is a legend. She created Privacy by Design during her tenure as Privacy Commissioner of Ontario, which landed her in the upper echelon of cybersecurity peeps.
Don't Waste Your Money

Adam Levin Discusses Top Scams of 2022 with Scripps Media

Adam Levin was featured on a syndicated news segment about the top scams of 2022 to date. "It's always the same music, it's just different...
brett johnson

Brett Johnson is the Bad-Guy-Turned-Good-Guy We’ve Been Wanting to Meet

Brett Johnson was a key member of one of the most active online criminal rackets until his conversion to good-guy status.
Alex Jones

How Alex Jones and Some Bad Cyber Hygiene Could Rewrite History

As Alex Jones is discovering this week, data can be very valuable. Here's what organizations can learn about data security.
social media privacy

How to Protect Your Privacy on Social Media

Getting the privacy settings on your social media accounts right is essential to your online security.
Michelle Tea

Michelle Tea’s Tarot Business Draws a Fool

Hackers clone accounts on Instagram, especially for professions that are hard to verify.
Email address

Who’s Selling Your Email Address? Here’s How to Find Out.

The email address you provide a website can be infinitely shared, bought and sold. Here’s how to track who’s behind all that spam.