Philippa Ward

Philippa Ward’s Support Call Ransacks Her Computer

A real estate agent specializing in vineyards narrowly averts catastrophe with tech support scammers.
Geofencing

Geofencing – What it is and How it Works

Geofencing is a powerful cybersecurity tool and an Orwellian people tracker. Here’s how it works.
Fumiko and Poison Cheescake

Fumiko Talks Poison Cheesecake and Toxic Boyfriends

A sketchy sniper or pathological liar put our guest Fumiko through the wringer, but did he have the FBI hack her phone?
Rainbow tables

Rainbow Tables: What are they?

Rainbow tables provide hackers with a powerful tool to decrypt hashed passwords. Here's how they work.
Deviant Ollam

Deviant Ollam Picks the Lock to Adam’s Heart

World-renowned physical penetration tester Deviant Ollam joined us to tell us the myriad ways one can do the sneakiest things without being sneaky at all.
Holiday tips

Top 9 Holiday Practices to Keep Your Money Where It’s Supposed to Go

The Santo-meter says….the holiday season has already begun. The big box stores are starting early this year, and so should you.
The Big House

Beau Gets Hacked on the Way to the Big House

Beau is constantly trying to get hacked so he can live to tell the tale. Every once in a while it actually works.
double spear phishing

Double Spear Attacks: The One-Two Cyber Scam that Targets Your Money and Your Data

It's important to keep in mind that while one may be privy to phishing signals in their inbox, these phishing invoices are shielded behind legitimate domains and trickier to catch. Here’s how you can protect yourself.
Chris Hutchins

Chris Hutchins’s Travel Hacking Gets Hacked

Chris Hutchins had a point. Ten million, in fact. And then they got stolen.
Single, Double and Triple Ransomware

Single, Double, and Triple Extortion Ransomware Attacks

Ransomware gangs are increasingly building in additional layers of extortion in their attacks. Introducing double and triple extortion ransomware attacks.