Now North Korea Using Fake IT Workers to Extort Employers Scams evolve. Now that the scam concept is public, North Korea is pivoting. They are extorting the companies that hire these North Koreans as IT employees after the employees steal corporate secrets. Read the details here. SURPRISE! (Not) – OpenAI Confirms Attackers use ChatGPT to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
One of the biggest uses of the Internet is to sell sex. Whether it is chat rooms, pictures of naked people, whatever, it is a big money maker on the Internet. The hottest subject in town these days, even hotter than crypto, is AI. So what are Russian hackers doing? They are combining sex and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Security or convenience, pick one. Background: there is a difference between IDENTIFICATION and AUTHENTICATION. Identification is the equivalent of a userid. Userids are not secret. Authentication is the equivalent of a password. Passwords are secret. Many systems use biometrics like a face scan to BOTH identify a user and authenticate that it is really that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
What Does $50,000 in iPads Get You? The answer may be a prison sentence for bribery. The case is going back and forth, but now the case is back on. The head of Apple security wanted some concealed carry permits for his team and since the process wasn’t going as fast as Apple would like, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In case you have not notice, email security firm Cofense scanned emails from 35 million of its customers. Luckily, they used machine learning to do the analysis. Cofense’s report has these major conclusions: The numbers are a bit mind boggling. Among the statistics – A third of the phishing emails have a finance theme. This […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is very useful – we all know it. But useful for whom? Apparently hackers are setting up fake websites for popular free and open source software to promote downloads through ads and search engine marketing in Google search results. What the hackers do, among other things, is create fake domains that look like the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]