CNBC - stimulus checks scams

Adam Levin Warns of Stimulus Check Scams on CNBC

Adam Levin was featured on CNBC where he warned of the new wave of scams targeting recipients of stimulus checks. “They’re looking to get sensitive...
What the Hack

Zoom Zero-Day Exploits Up For Sale on the Dark Web

Two critical zero-day exploits for the Zoom video conferencing platform just hit the market. The alleged exploits take advantage of vulnerabilities in Zoom’s Windows and...
Email quarantine

Your Email Needs to Shelter in Place, Too

The Covid-19 pandemic created an opportunity for hackers to target the newly remote workforce. Hospitals have been targeted by ransomware (despite initial assurances to...
E-Skimming

WooCommerce Sites Targeted by E-Skimming Attacks

Researchers at the cybersecurity firm Sucuri have uncovered a new set of e-skimming attacks targeting websites using the WordPress WooCommerce e-commerce plugin. E-skimming attacks typically...
Cybersecurity vendor

How to Pick the Right Cybersecurity Vendor for Your Business

Businesses across the country have had to adjust to their employees working from home. For many it was a last-minute scramble to adjust to what has become...

Beware Voice Deepfakes: Third Certainty #16

In the latest episode of Third Certainty, Adam Levin explains the danger of voice deepfakes.
Marriott Breach

How Marriott Customers Can Protect Themselves From The Latest Breach

Marriott International announced a data breach that may have exposed the information of 5.2 million guests. Among the information potentially compromised are names, birthdates,...
Remote work security

Worried About Your Remote Team’s Cybersecurity? Do These 5 Things Right...

The Covid-19 pandemic has sparked a mass exodus from offices around the world with millions of people now working from home. Hackers are already...
Zoombomb

How to Protect Against Zoombombing

Video conferencing platform Zoom has been crowded with the spread of the Covid-19 pandemic and the adoption of social distancing measures. Criminal cyber activity has...
homograph

Homographic Hacking: What It Is and How It Works

If you are moving fast as we tend to do during the workday, the following four web addresses may not look so different from...