Welcome to

Our Blog

June 1, 2020

If you are a vice president or managing director and are working in either banking or IT, be very wary of any emails with any attachments, especially those that lead to a site with a reCAPTHA. If you finally make it to a login page, look closely at the URL, especially, the extension. This is a well-designed attack that is destined to produce a lot of victims. Try not  to be one of them.

June 1, 2020

A few of the more well-known apps Alien  can take control of:  
Microsoft Outlook, Bank of America Mobile Banking, Capital One Mobile, Wells Fargo Mobile, Google Play, Facebook, WhatsApp Messenger, Snapchat, Twitter, Instagram, and Skype.

COVID-19 + Excel Attachment = Lost Data

June 1, 2020

Be aware of any email that evades your spam filter and seems to come from Johns Hopkins or W.H.O. (World Health Organization) with a tie to COVID-19 in the subject line. . . it's a phishing attack using an Excel attachment.

Russian Gang Making Millions Hacking Cities and Counties across America

May 6 2019

Once upon a time, North Korea only cared about cyber espionage. Most of the time, they wanted to spy on South Korea or disrupt South Korean operations. Then, a terrible thing happened.

April 8, 2019

Bad apps keep getting through; according to Google, less than 1%. Nonetheless, 1% of 1 billion is still 10 million… just saying.  Notice that apps containing Trojans lead the way, and that’s not good. These apps release malware that can quickly gain control of your device. These are often RATs (Remote Access Trojans) which enable hackers to control your device remotely.

March 18, 2019

If the Citrix hack really did come from the Iranian government, we should expect some attacks on key U.S. government agencies in the future. Stay tuned. This could be an interesting year in cybersecurity.

Hackers Find a New Way to Get Control of Your Bank Account

March 11, 2019

Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. .

When Algorithms Go Bad

March 11, 2019

Algorithms could be manipulated to have weapons misfire or fire on the wrong target . . . A database, itself, could be infected to make algorithms reach dangerous conclusions

It’s Hacking Season in Tibet

February 25, 2019

The scenario outlined above highlights the sensitivity of algorithms to manipulation by nefarious agents. Algorithms could be manipulated to have weapons misfire or fire on the wrong target,

5 Surprising and mostly Unknown Cyber Security Facts

February 18, 2019

At the time of this writing, SpeakUp is being used to install cryptomining software, however, few researchers believe this is its ultimate goal, as it has the sophisticated architecture to launch a far more devastating worldwide attack.


February 11, 2019

Clicking on one of the options shown above will take you to these fake survey sites or to sites offering free gift cards to well known stores. All you have to do is give them some personal information.

Read More

“Love You” Phishing Emails Arrive in Time for Valentine’s Day

February 4, 2019

The point is to get you interested in the subject line, abandon normal caution, and open the inviting attachment. Sadly, you will find no love there.

The Business Process Compromise: The Cyber Attack You Don’t See Coming

January 28, 2019

Most companies and organizations simply can’t compete with the hackers behind these attacks. If a breach actually occurs, the F.B.I. suggests you work with them.  

rise in malware.png

Cyber Insurance Firms Fund Malware Development

January 21, 2019

Billions are being made by these extortionists because ransomware is the easiest way for hackers to get a quick payoff. If cyber insurance companies guarantee ransom payments, they, in effect, guarantee an income for novice hackers around the globe.