botnet

Botnets: What are They and Why do They Matter?

Botnets pose a powerful risk to individuals, enterprises, and government institutions. Here's what you need to know.
Amazon handprint

Amazon Goes Trolling for Identities

Your palm print is worth more than $10.
Dan Stops a Slow-Roll Ransomware Attack

Dan Stops a Slow-Roll Ransomware Attack

Ransomware doesn’t have to be a game-ender.
three word password

The Flaw in Three Word Password Systems

Using a three-word password system to protect your accounts is a good idea, but it overlooks a major security issue.
Washington Post

Adam Levin’s Comments on the T-Mobile Data Breach Featured in Washington...

Adam Levin was featured in a Washington Post article on the recent T-Mobile data breach. Levin warned of the uses of data stolen by...
Detroit Free Press

Adam Levin’s Commentary on T-Mobile Data Breach Featured in Detroit Free...

Adam Levin was featured in an article by Susan Tompor in the Detroit Free Press about the recent T-Mobile data breach. "The T-Mobile breach is...
Noah Doesn't Buy the Ark

Noah Doesn’t Buy the Ark

With online scams at an all-time high, consumers should be on the lookout for the usual suspects in Scamland dressed in new disguises.
WBBM

Adam Levin’s Comments on Cryptocurrency Heist Featured on WBBM Newsradio Chicago

Adam Levin was featured on Chicago's WBBM Newsradio discussing the recent theft of over $600 million in cryptocurrency, nearly half of which was returned...
What the Hack Episode five

Cristian Walks the Plank in Pirate Bay

Obsolete platforms and outdated malware still pose an ongoing threat.
ITSP Magazine

Adam Levin and Beau Friedlander Featured on Redefining Society Podcast

What the Hack podcast hosts Adam Levin and Beau Friedlander were featured on the most recent episode of the Redefining Society Podcast with Marco...

New Ban-as-a-Service Scam Targets Instagram Users

Scammers are abusing Instagram to ban user accounts for as little as 5 Euros.
What the Hack Episode Four

Sally Gets Taken For a Ride

Typosquatting and remote access trojans can be a dangerous and costly combination.
Toying with Takeover Artists (and an Easy Way to Foil Hackers)

Toying with Takeover Artists (and an Easy Way to Foil Hackers)

This week, I got phished (an email attack), smished (the same thing via text message) and quasi-vished (when the scammer calls you claiming to represent a company or organization). 
Sextortion scam

Episode 3 of What the Hack Is All About Sextortion

If there’s one thing that Covid-19 proved, it’s that there’s no end to how low threat actors will go to turn a profit.
sextortion

Jake’s Dirty Little Secret

A globetrotting journalist is targeted by a sextortion scam.
Pegasus Spyware

High Profile Incident: Pegasus Spyware Found on 50,000 Smartphones

NSO’s controversial Pegasus spyware has been used to surveil over 50,000 targets, including heads of state, journalists and human rights activists.
News-Gazette

Adam Levin Featured Cybersecurity Expert for News-Gazette

Adam Levin was a featured expert in a News-Gazette feature: "Big 10: What you need to know about cybersecurity." "Bottom line: Most of us know...
West Virginia Ransomware

Threat Actors Demand $70 Million Ransom from W. VA School District

A school district in Morgan County, West Virginia was hit by a ransomware attack with $70 million demanded in return for their data.
What the Hack Episode Two

Christen’s Enemy with Benefits

Unemployment scams, biometric authentication, and more.
China hacking

The U.S. Finally Accuses China of Worldwide Hacking Attacks

Joining allies from around the world, including every member nation of NATO, the United States formally accused China of hacking Microsoft.