Image by Getty Imagesread more →
The Google Twitter account for its G Suite cloud subsidiary, which has more than 800,000 followers, has been the most recent target of a growing Bitcoin scam. Many have been asking Twitter to intervene due to the increasing success of these attacks and the growing ability for hackers to compromise verified Twitter accounts. When these accounts are accessed, attackers tweet out a falsified 10,000 Bitcoin giveaway, which equates to around $62,000 dollars.read more →
Social Engineering attacks can be physical or cyber. One type of physical attack includes Tailgating, and it is not done in a car. Tailgating, in a social engineering sense, is when a person gains unwanted entrance into a facility by using tricks and tactics to fool the employees of that company.
read more →
Shoulder surfing is something that most people do every day in one way or another. Most of the time, this simple practice is done without the intention of stealing information. This practice can be used for malicious purposes however, so it is important to prevent unwanted parties from viewing confidential information or trade secrets displayed on your screen.read more →
Why Derbycon is So Good for the Security Community
I had a chance to go to DerbyCon for the first time this year. I was amazed at how great it was and a lot of fun of course, but there was more to it than that. I’ve been to many regional conferences, as well as Def Con, Black Hat, RSA and even Gartner security conferences, but DerbyCon was altogether different and felt like there was a higher benefit that I couldn’t put my finger on.read more →
UPDATE 5/18/2017 10:40AM ET: A new tool was released from Adrien Guinet that can decrypt WannaCry impacted systems. This only works on Windows XP due to using proper cryptography libraries. In Windows XP, it's possible to search the wcry.exe memory and does not erase the prime numbers used to generate the key. Link here to download.read more →