Want to know what the most in demand skill is on the underground job boards? English language social engineering. The ads on the boards doubled between last year and this year. One security CEO calls this Impersonation as a service or IaaS, not to be confused with the other IaaS, Infrastructure as a service. You […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Qubic Claims to Control Monero Mining Any blockchain is supposed to be unchangeable. That is unless you control the hashing function. The premise behind all blockchains is that there are a lot of independent hash systems which prevents collusion to change the data. If you can change the block data then it is like a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Consumers lost almost a billion dollars to Zelle fraud between 2017 and 2023. While that sounds like a lot, Zelle transferred over a trillion dollars last year. Zelle – officially Early Warning Services – is owned by the big banks including Wells, Chase, Bank of America and a few others. While many kinds of bank […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I don’t know whether this is a slow news week or things are getting bad but check out all of these items this week: I could have easily listed twice as many hacks, but I stopped after a dozen. So you tell me – is this just a bad week or are the hackers winning? […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Drug Cartels Use IT to Kill FBI Informants According to a newly published report, a Sinaloa cartel/El Chapo insider contacted the FBI in 2018 and told it of all the ways in which the cybercrook hired by the cartel helped it track down those who could give up key details about its operation and eliminate […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I can’t say this enough. Supply chains are the weak spot and hackers know it and abuse it. Scattered Spider, the group responsible for attacks on US insurance firms Aflac, Philadelphia and Erie and British retailers like Marks & Spencer and others, uses supply chain attacks as their favorite method. After they use social engineering […]
Continue reading →
[DISPLAY_ACURAX_ICONS]