Get in Touch
Single, Double, and Triple Extortion Ransomware Attacks
Ransomware gangs are increasingly building in additional layers of extortion in their attacks. Introducing double and triple extortion ransomware attacks.
Freewheeling with Cyber Red Queen Tarah Wheeler
I know this will come as a shock to you, but there’s a “every gender identity you can imagine gap” in cybersecurity.
Phishing-as-a-Service: What You Need to Know
Cybercriminals are now offering access to sophisticated phishing toolkits for a fee or a cut of the profits.
Joelle’s Identity Thief Almost Stumps the Chumps
When a credit card Joelle seldom used was compromised, her bank sent her the bill.
Adam Levin Discusses Oversharing Children’s Info on Social Media with NW...
Adam Levin was featured in a news segment on NW News Radio where he discussed the dangers of oversharing information about children on social...
Adam Levin Shares Tips with CBS New York for Keeping Kids...
Adam Levin highlighted the potential risks involved with sharing photos of children returning to school for a new year in a new segment on...
Andrew Gold Investigates A Dark Corner of the Internet
Investigative journalist and podcaster Andrew Gold went to Germany to report on a controversial law.
Adam Levin Talks with KOMO News About Student Loan Forgiveness Scams
Adam Levin discussed how the Biden Administration's recent announcement of forgiveness for some student loans will likely open the door to a set of...
Adam Levin Talks Zelle Scams with Reader’s Digest
Adam Levin recently shared tips with Reader's Digest about the cybersecurity risks of using Zelle for peer-to-peer payments.
Check out the article here.
Caitlin Brodnick Sees Pro Wrestlers on Her Reality TV
Caitlin Brodnick of the ScamWow podcast joins What the Hack to talk about the real scams of reality television.
How to Do a Personal Privacy Audit
While the management of your online reputation is a personal choice, completing a personal privacy audit is essential to protect against both “real world” crime and cybercrimes.
Dara Starr Tucker Sees Right Through a Scam
Real estate scams are everywhere. But what Dara Starr Tucker uncovered wins this week’s Cyber Compromise Darwin Award.
Out of the Office? How to Avoid OOO Phishing Attacks
Out of Office notifications are a good way to let people know you’re not available to respond to emails. They’re an even better way for hackers to gain admission to your organization.
Ann Cavoukian Fights For Your Right to Privacy
When it comes to privacy, Ann Cavoukian is a legend. She created Privacy by Design during her tenure as Privacy Commissioner of Ontario, which landed her in the upper echelon of cybersecurity peeps.
Adam Levin Discusses Top Scams of 2022 with Scripps Media
Adam Levin was featured on a syndicated news segment about the top scams of 2022 to date.
"It's always the same music, it's just different...
Brett Johnson is the Bad-Guy-Turned-Good-Guy We’ve Been Wanting to Meet
Brett Johnson was a key member of one of the most active online criminal rackets until his conversion to good-guy status.
How Alex Jones and Some Bad Cyber Hygiene Could Rewrite History
As Alex Jones is discovering this week, data can be very valuable. Here's what organizations can learn about data security.
How to Protect Your Privacy on Social Media
Getting the privacy settings on your social media accounts right is essential to your online security.
Michelle Tea’s Tarot Business Draws a Fool
Hackers clone accounts on Instagram, especially for professions that are hard to verify.
Who’s Selling Your Email Address? Here’s How to Find Out.
The email address you provide a website can be infinitely shared, bought and sold. Here’s how to track who’s behind all that spam.