Unveiling the Dark Secrets of BEC Scammers

Unveiling the Dark Secrets of BEC Scammers

In the ever-evolving landscape of cybercrime, the Business Email Compromise (BEC) has emerged as a potent weapon for hackers and scammers to dismantle businesses and siphon off enormous sums of money. A recent incident involving a US hoser operating from Brazil...
Tech Talk Show Notes – March 13, 2021

Tech Talk Show Notes – March 13, 2021

Read. Learn. Share. Tech Talk Show Notes March 13, 2021   Tens of thousands of US organizations hit in ongoing Microsoft Exchange hack Tens of thousands of US-based organizations are running Microsoft Exchange servers that have been backdoored by threat actors...

Pesky Apps That You Need To Delete ASAP

Pesky Apps That You Need To Delete ASAP Not all Apps are Good Apps…   Depressive Apps. With everyone curating an unrealistic, heavily manufactured, idealized version of their lives, we all start to believe other people’s lives are so much better than...

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.

Vulnerable Location data — It does not take an Expert to Spy on your Every Movement with Your Phone.   The media tracked President Donald Trump’s movements during the campaign using cellphone data. Using leaked phone data to track the movements, one...