The Holy Grail of those sending phishing emails is getting into the recipient's inbox. Once there, they realize that the recipient (aka potential victim) will at least have to look at their creation before sending it on its way to the spam folder. And maybe, just maybe, they'll see an interesting subject line and open … Continue reading New Phishing Emails Use Invisibility to Bypass Email Filters
Month: June 2018
Using Ultrasound to Hack Air-Gapped Computers
Air-gapped computers are computers that are not connected to any network. They may even be physically isolated. Such computers are usually presumed to be safe from cyber manipulation. For this reason, businesses or organizations will often store important data on such computers. However, they are not as safe as most people think. Researchers have found … Continue reading Using Ultrasound to Hack Air-Gapped Computers
Fake Lawyers and Law Firms Scam Multiple Victims in Multiple Ways
When I started investigating this problem, I thought I might find a few fake law firms being used as fronts to perpetrate fraud. I now realize that I profoundly underestimated how widely this attack vector is being used. In fact, I doubt if the legal profession realizes what it is up against. There are a … Continue reading Fake Lawyers and Law Firms Scam Multiple Victims in Multiple Ways
Trending: Hacking School Networks to Change Grades
Have you noticed a sudden increase in your son's or daughter's grades? Do you wonder how they can do so well at school when they seem to spend most of their time playing online games? Well, maybe there's a simple explanation. You see, there's a new trend making the rounds among some students these days. … Continue reading Trending: Hacking School Networks to Change Grades