Click on Scam Email –> Destroy your Data

Posted on securitycompliance

FireEye Blogpost last week about phishing emails using the iCEDID phishing infection has an interesting image explaining this concept: This is a sophisticated phishing setup and thus it behooves us to review this carefully. If you notice the initial phishing email when opened has several embedded items as well as a password structure so that […]

Read more >

Catfishing Illegal? Spearfishing on Steroids?

Posted on ITSecurity Training

Threatpost has the story  in Utah legislation work.   Let’s explain some catfishing: “The practice of catfishing often occurs in online dating or social-networking scenarios in which someone takes someone else’s personally identifiable information–such as photos, addresses, educational history or professions–to pretend to be that person to seem more attractive or interesting to people they […]

Read more >

The Tri-Fecta IoT, Blockchain, & AI: Don’t worry about Cybersecurity

Posted on securitycommunity

Is it possible to make something more complex? IoT and Blockchain with a sprinkle of AI (Artificial Intelligence).   From the post at telecomcircle.com   : IoT, Blockchain & Artificial intelligence – new holy trinity.  All three technologies are at their peak of inflated expectations. It is possible that blockchain platform (the technology) can set […]

Read more >