“Technology Help” Cybercriminals Scam Seniors into Paying Thousands

“Technology Help” Cybercriminals Scam Seniors into Paying Thousands

“Technology Help” Cybercriminals Scam Seniors into Paying Thousands Computers began during our seasoned citizens lifetime. They did not grow up with them, and this places them at a distinct disadvantage when it comes to their level of understanding. Senior citizens...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...
Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base.

Privacy Comes To Largest Installed Browser Base. Mozilla is enhancing the privacy of its US-based Firefox browser applications with a new VPN privacy extension, this week. After downloading, they must sign in to their Firefox account and then click on the...
Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes

Chinese Front Organizations on Our Universities Used For Nefarious Purposes ​ It seems as though there are countries that are intent on stealing our intellectual property and technology through fraud, and China appears to be one of the biggest perpetrators. Just this...
You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money

You Can Buy Anything In This World For Money You can buy anything in this world for money — nowhere is this statement truer than on the Dark Web. No matter what a cybercriminal is looking for with money someone in the dark web supply chain which is willing to provide...
Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For Long

Enjoying Some Anonymity Maybe Not For Long Worldwide in research labs engineers are working on some scarily intrusive surveillance technology tools. But what happens once these technologies have completed the design and testing process — they must be sold and used....