Get in Touch
Philippa Ward’s Support Call Ransacks Her Computer
A real estate agent specializing in vineyards narrowly averts catastrophe with tech support scammers.
Geofencing – What it is and How it Works
Geofencing is a powerful cybersecurity tool and an Orwellian people tracker. Here’s how it works.
Fumiko Talks Poison Cheesecake and Toxic Boyfriends
A sketchy sniper or pathological liar put our guest Fumiko through the wringer, but did he have the FBI hack her phone?
Rainbow Tables: What are they?
Rainbow tables provide hackers with a powerful tool to decrypt hashed passwords. Here's how they work.
Deviant Ollam Picks the Lock to Adam’s Heart
World-renowned physical penetration tester Deviant Ollam joined us to tell us the myriad ways one can do the sneakiest things without being sneaky at all.
Top 9 Holiday Practices to Keep Your Money Where It’s Supposed to Go
The Santo-meter says….the holiday season has already begun. The big box stores are starting early this year, and so should you.
Beau Gets Hacked on the Way to the Big House
Beau is constantly trying to get hacked so he can live to tell the tale. Every once in a while it actually works.
Double Spear Attacks: The One-Two Cyber Scam that Targets Your Money and Your Data
It's important to keep in mind that while one may be privy to phishing signals in their inbox, these phishing invoices are shielded behind legitimate domains and trickier to catch. Here’s how you can protect yourself.
Chris Hutchins’s Travel Hacking Gets Hacked
Chris Hutchins had a point. Ten million, in fact. And then they got stolen.
Single, Double, and Triple Extortion Ransomware Attacks
Ransomware gangs are increasingly building in additional layers of extortion in their attacks. Introducing double and triple extortion ransomware attacks.