All Posts

Show
How cybercriminals are taking advantage of COVID-19: Scams, fraud, and misinformation
March 12, 2020 read more

Open Source Intelligence versus Web Search: What’s The Difference?

July 11, 2016

“I can get that from Google!” – is a common phrase that has been directed at me during my time …

read more

Three Tactics Behind Cyber Extortion

July 11, 2016

As explained in a previous blog, extortion is not new – it’s now just been applied to the digital world …

read more

Modern crimeware campaigns – two bytes of the cherry

July 5, 2016

To a Columbian drug lord, the most valuable commodity is probably cocaine. To many financially motivated cybercriminals, the most valuable …

read more

10 ways to prepare for credential leak incidents

June 30, 2016

From LinkedIn to MySpace, threat actors like Peace of Mind and Tessa88 have been selling credentials in various criminal dark …

read more

Recycling, bad for your environment!

June 27, 2016

The news is constantly flooded with yet another breach of a high profile vendor. Perhaps the biggest and most publicized …

read more

The philosophical difference between the Old and New Schools of the cybercriminal underground

June 27, 2016

I would recommend that anyone interested in the serious study of criminal activity on the dark web should pick up …

read more

Spidey-sense for the people

June 23, 2016

If you liked Marvel’s SpiderMan then you will recognize the special Spidey-sense skill that Peter Parker possessed. The skill refers …

read more

Forecasting the implications for cybersecurity in Britain after Thursday’s referendum

June 21, 2016

On Thursday, the United Kingdom goes to the polls to vote on one of the most important and contentious referendums …

read more

Shining a light on the dark web

June 21, 2016

The dark web receives more than its fair share of media coverage pertaining to cyber crime. But, amid all of …

read more

Standoff in cyberspace

June 17, 2016

In physical security terminology, standoff is the term used to refer to the physical distance between a defender and a …

read more