Google’s assistance is undeniable, but it comes with a hidden fee. Data collection and user profiling are not shocking now, but how exactly did we get here?
Category Archives: Blog
How Tech Giants Benefit From Data Collection?
Mass data collection is embraced by big tech companies not only to benefit from customers, but also to identify competition that could threaten the status quo.
5 Reasons Why Simulated Phishing May Not Be Such a Great Idea
Simulated phishing can be helpful, but it can also do more harm than good. This blog post highlights common mistakes that occur during user awareness tests.
8 Privacy and Security Issues to Think About if You’re Using Zoom
Zoom has over 13 million monthly active users, and most of them are oblivious to privacy and security issues this video conferencing app brings.
Why Most Hackers Are So Bad at English?
Bringing up 5 theories that would explain why English language and hackers have a beef.
Weaponized Pandemic: Actions Criminals Take in Tragic Times
Nothing is sacred for cybercriminals, especially in times of mass confusion, hardship, and angst. Learn how criminals leverage email to accomplish their goals.
Let’s Encrypt CAA Rechecking Bug Affected 3 Million Certificates
Let’s Encrypt discovered a bug in itss certificate authority authorization software, prompting subscribers to react.
BEC Takes $388,700 From “Shark Tank” Star Barbara Corcoran
In a classic case of Business Email Compromise (BEC), Barbara Corcoran loses close to $400,000. The scam came through because of a spoofed email address.
Amazon Phishing Email Attack Botched By The Hackers
Phishing email coming from Amazon is not a surprising story, but the latest Sophos blog post describes a bizarre situation, where hackers failed in fashion.
Confrontation Based On Deception: $3.1 Million Swindled During Negotiations Over John Constable Painting
A classic example of Business Email Compromise recently put a wedge between art dealer Simon C. Dickinson Limited and Rijksmuseum Twenthe.