Dr. Suess created that grey fuzzy-haired creature many years ago, the Grinch, who stole Christmas. While not quite as cute and fuzzy as the Grinch, today’s cybercriminals are posing as a similar sounding nefarious activity, the Glitch.
After reading the recent FBI report on the state of email related cybercrime in 2022, one statistic popped out at me, when correlating different parts of the report related to Business Email Compromise and Ransomware.
We’ve had a few days of insightful discussions at the world’s largest legal IT security event, ILTA LegalSEC. Since many of you are not able to (or not in the right frame of mind to) travel to beautiful Baltimore to experience this event live, I thought I would dedicate this week’s Tech Essentials to sharing the top three FBI-special-agent speaker insights (from my perspective).
Remember that classic book from high school English class, Animal Farm by George Orwell? (This is when the teacher droned on about what an ‘allegory’ was 😊.) Even if you don’t remember, there’s a famous bit where one of the anthropomorphized sheep says, “four legs good, two legs baaad.” What he means is that you should trust the animal that is more sturdy—that sheep don’t teeter and wobble like those unruly two-legged humans.
A quick program note for our regular readers: we’re interrupting our scheduled series on the best-in-class, scalable eSignature software that is RSign so that we can address some important current economic events…
Guess which of these conspiracy theories is actually true. This article is the fourth and final of a series devoted to Email Eavesdropping™ threat hunting.
RMail’s heartbeat monitor is like having your own email secret service patrolling your inbox. Previously on Tech Essentials, we let you live through, in chilling detail, a sophisticated email scam that originated with an email exchange that was eavesdropped on by a cybercriminal gang. In retrospect, the most sophisticated aspect of the scam was the […]
You may wish you were one of the zombies from The Last of Us after a BEC attack. Previously on Tech Essentials, we introduced you to the cybercrime phenomenon initiated by Email Eavesdropping and ending in a mis-wire, in part 1 of a 3-part series we’re running.
What were the top tech and e-security trends of 2022? What can be said about 2022 that hasn’t already been said? You’ve likely already been inundated with perfunctory retrospectives on the ‘year that was’—the Ukraine War, Elon Musk, inflation, midterms, Kanye West, ‘the slap’, Messi, et al. But I would like to think that 2022 […]
It’s finally Blaber Fronday! We’re offering a money saving deal for e-sign, e-security and file sharing that happens only once a year. These days, if you want a memorable catchphrase, you opt for the portmanteau—where two words or names become one (e.g. “brunch”, “chillax”, “Brangelina”). Everybody’s doing it—even health policy wonks (“twindemic”, “tripledemic”) and economists […]
September 29, 2023
September 22, 2023
September 15, 2023
September 08, 2023
August 31, 2023