Stalkers Get a New Weapon: Stalkerware 2.0

"Stalking is when two people go for a long romantic walk together, but only one of them knows about it.". Stalking, in many places, is a crime. But it is not a crime to install stalkerware on someone's smartphone. Why is this? Because no developer ever names such applications 'stalkerware'. Naming them as such would … Continue reading Stalkers Get a New Weapon: Stalkerware 2.0

Coronavirus Tracking App is Actually Phone-Locking Ransomware

As the coronavirus panic intensifies, it's only natural for people to become desperate to learn if anyone in their immediate area has contracted the disease. It's just as natural for them to welcome an app that promises to keep them updated on the latest COVID-19 news. And that's exactly what the COVID-19 Tracker promises. In … Continue reading Coronavirus Tracking App is Actually Phone-Locking Ransomware

Coronavirus Phishing Scams Begin Targeting Corporations

The first coronavirus phishing scams were pretty obvious. Mostly, they hoped to trick people into visiting sites that the emails claimed offered special treatments or gave out some sort of secret information. In fact, most such emails were captured by spam filters. Now, however, as the virus spreads throughout the world and more people become … Continue reading Coronavirus Phishing Scams Begin Targeting Corporations

The Hacking of the Agency Protecting White House Communications: Some Speculations

Recently, the Defense Information Systems Agency (DISA) indirectly announced that it had been hacked. We learned of this through letters that were sent to 200,000 potential victims in which it was stated that their personal information may have been stolen. No, it was not recently stolen. It was stolen sometime between May and July of … Continue reading The Hacking of the Agency Protecting White House Communications: Some Speculations

Identifying Potential Malicious Insiders

All insider threats are not created equal, however, all can do equal amounts of damage to a company or organization. I have written on this topic before in relation to the F.B.I.'s IDLE program, which was begun to help companies find malicious insiders. In this post, I want to focus more on the insiders themselves, … Continue reading Identifying Potential Malicious Insiders