Warning About Security of Cryptocurrency

Warning About Security of Cryptocurrency If you have listened to me for a while, you know how I feel about Cryptocurrencies, and it looks like I was right all along. It is fraught with fraud that prays on peoples hopes and dreams. The criminal activity of ransomware...
Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...

A Nation of Super Hackers and They are Coming For Your Business!

North Korea. What do you think when you hear about this country?  You probably think of a nation that has separated from progress and technology. A country run by a socialist despot. A hermit kingdom that strictly controls the daily activities of its people. A country...
How A WhoIs Check Could Have Halted A Scam

How A WhoIs Check Could Have Halted A Scam

How A WhoIs Check Could Have Halted A Scam A Wendi Deng Murdoch imposter tricked photographers into paying for flights to and photography permits in Indonesia, and a more thorough Whois lookup could have saved the victims from losing money and time. CNN reports about...