Social Engineering the Silver Screen: Home Alone Edition

I have wanted to do a series like this for some time. I frequently watch movies and point out social engineering and OSINT techniques or inaccuracies as well as OPSEC blunders. These blunders, in addition to the matrix style waterfall screens, are equa… Continue reading Social Engineering the Silver Screen: Home Alone Edition

Why OPSEC Is For Everyone, Not Just For People With Something To Hide – Part II

This is a follow-up/continuation to Part One of the series, where I recommend reading to help provide some background into why we should all consider reviewing our OPSEC (Operational Security), not just those with something to hide. Have you actually t… Continue reading Why OPSEC Is For Everyone, Not Just For People With Something To Hide – Part II

Discovery of Geost Botnet Made Possible by Attacker OpSec Fails

A series of operational security (OpSec) failures on the part of attackers enabled researchers to discover the Geost botnet. In mid-2018, Virus Bulletin researchers Sebastian Garcia, María José Erquiaga and Anna Shirokova discovered Geost, on… Continue reading Discovery of Geost Botnet Made Possible by Attacker OpSec Fails

American Sues US Government For Allegedly Pressuring Him To Unlock His Phone at Airport

CBP and DHS officers allegedly detained a Los Angeles man of Muslim faith before he boarded a plane for four hours, asking him questions and pressuring him to show them the contents of his phone. Continue reading American Sues US Government For Allegedly Pressuring Him To Unlock His Phone at Airport

Beware of the New Way Crooks Can Drain Your Credit Card Account

This article describes one of the recent frauds used by cybercriminals to steal funds from people’s credit cards. Unfortunately, it is a simple one to pull off, so peruse the details below and make sure you don’t get on the hook. The malici… Continue reading Beware of the New Way Crooks Can Drain Your Credit Card Account

How to mitigate the risks of using new, third party imported electronic accessories?

As someone who is naturally good at recognizing risk and who are striving to maintain a wholistic view on security, I’m wondering how to evaluate and reduce the risks of hardware accessories (I.e. charging plug-ins, Thunderbolt cables), sp… Continue reading How to mitigate the risks of using new, third party imported electronic accessories?