Skip to content

Evgen Verzun Cybersecurity Blog

Category Archives: Blog

Information Operations and Synthetic Media Versus the 2020 US Elections

APT Information Operations

Information operations handled by experienced and politically motivated nation-state hackers are not on the radar, but they should be ‒ the elections are close.

Posted byBlog-adminAugust 28, 2020August 28, 2020Posted inBlog

Age Is Just a Number? Three Young Men Behind the Recent Twitter Hack

Twitter Hack Charges

The FBI tracked down three young men responsible for a recent Twitter hack and the following cryptocurrency scam involving the platform’s biggest accounts.

Posted byBlog-adminAugust 6, 2020August 6, 2020Posted inBlog

V Stands for Vigilante: Unknown Hacker Derails Emotet’s Comeback

TROJAN Emotet GIF

Mysterious vigilante hacker is embarking on a mission of replacing Emotet payloads with GIFs to save targets from infection.

Posted byBlog-adminJuly 30, 2020July 30, 2020Posted inBlog

Scammers Push Crypto Scam From Some of the Biggest Twitter Accounts

Twitter Hack

Some of the more popular Twitter accounts were hijacked by scammers and used to promote an evident crypto scam, which still made miscreants a fortune.

Posted byBlog-adminJuly 17, 2020July 17, 2020Posted inBlog

LinkedIn, TikTok, Reddit Capture the Clipboard Content on Each Keystroke

Clipboard Content Capture

New privacy feature in IOS 14 and iPadOS show us how applications capture clipboard data from our devices. Why is it important and how can we minimize the risk?

Posted byBlog-adminJuly 14, 2020July 14, 2020Posted inBlog

Facial Recognition Technology Comes to Russian Schools

Orwell Surveillance

43,000 Russian schools will kick back to 1984, as facial recognition technology makes its way into educational facilities.

Posted byBlog-adminJuly 3, 2020July 3, 2020Posted inBlog

Dare to Share Geolocation for a Burger?

Geolocation and Burger King

COVID-19 is still a thing, and Brazilian Burger King tries to cash in on the quarantine. Gamification and geolocation is a whopper combination, especially now.

Posted byBlog-adminJune 19, 2020June 19, 2020Posted inBlog

Fortune Doesn’t Favor Brave Browser Users

Brave Browser Controversy

Be careful who you trust. Brave browser caught up in another controversy, now concerning a shady URL modification.

Posted byBlog-adminJune 12, 2020June 15, 2020Posted inBlog

Why Youtube Is a Good “Crutch” For Carrying Out Cyberattacks

Youtube Cyberattack

Youtube is not associated with cybercrime, and is relatively safe, but can still be used to support various cyberattacks and scams.

Posted byBlog-adminMay 22, 2020May 22, 2020Posted inBlog

Google and User Privacy: The Evolution of a 20-Year Relationship

Google Privacy

Google’s assistance is undeniable, but it comes with a hidden fee. Data collection and user profiling are not shocking now, but how exactly did we get here?

Posted byBlog-adminMay 14, 2020May 14, 2020Posted inBlog

Posts navigation

Newer posts 1 2 3 4 5 6 Older posts

Recent Posts

  • XRP Alternative You May Want to Keep In Sight
  • The Biggest Problem Crypto Startups Keep Overlooking
  • Revisiting The Ethereum Improvement Proposal 1559
  • Metaverse As The Future of The Internet
  • The Threat of AI-Powered Disinformation

Recent Comments

    Archives

    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • March 2022
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • March 2021
    • December 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • November 2019
    • October 2019
    • September 2019
    • July 2019
    • February 2019
    • November 2018

    Categories

    • Blog
    • Published

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Evgen Verzun Cybersecurity Blog, Proudly powered by WordPress.