Myanmar Cyber Crime Bosses Handed to China You may remember that a couple of weeks ago I reported that the Myanmar government turned over control of the part of the country where Crime bosses were running various social engineering scams and human trafficking to the rebels who threatened to shut them down. Now there are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Just to be clear here, the celebrities have nothing to do with this. In one campaign, Canadian celebrity chef Mary Berg shows up in ads. The headlines scream ‘global scandal’. She is depicted in courtrooms, sometimes handcuffed behind her back, etc. Other headlines say her career is over. What is the purpose? Apparently, trying to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Verizon published some great tips on what to look for in potential phishing emails. Phishing attacks fall into several categories including: So how do you identify fake attempts to separate you from your information and your money? Here are some suggestions. Verizon has examples to peruse (assuming you don’t already get enough) as well as […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Know Your Customer or KYC is a mandate of federal law for the financial services community such a banks, brokers and fintech. Often companies use “ID images” to confirm a person is who they say they are. Even some cryptocurrency platforms rely on this. Viral posts on Reddit and other social media show how, using […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
AI and the End of Privacy A couple of Stanford grad students have written an AI app that using a very small dataset (400,000 images) can detect your location. PIGEON, as the project is called, can predict the country of the image with 92 percent accuracy and provide location within 25 kilometers in 40 percent […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Low Code/No Code Apps Not A Security Nirvana Just because the computer is generating much of the code does not mean the software doesn’t have bugs or is secure. In fact, since many times non-developers are using the tools, the code may be less secure. Details at The Hacker News As If Twitter Doesn’t Have […]
Continue reading →
[DISPLAY_ACURAX_ICONS]