It’s All About The Execution Phishing is an abstruse threat. In essence it is just lying with a goal and a plan. Deception is everywhere when humans interact, some by accident, some not by accident. There are specific markers one can look for in email phishing....
What If A Hacker Pretended To Be You? Spoofing is the security term for when someone pretends to be someone else. The whole point of building relationships is to build trust. But what if in that relationship, a hacker pretended to be you? Imagine you are on onboarding...
What If A Hacker Pretended To Be You? Spoofing is the security term for when someone pretends to be someone else. The whole point of building relationships is to build trust. But what if in that relationship, a hacker pretended to be you? Imagine you are on onboarding...
What If It Was Your Hero? Imagine you are at a festival, party, networking event, conference and you see someone you highly admire is there. You go up and talk to them about whatever you share in common. Then you ask if you can have an address to stay in touch with...
Don’t Let A Mistake Turn Into A Catastrophe One of the unintended consequences of a hack is the ability for collateral damage to snowball into an avalanche, taking out unconnected people and companies. Imagine a set of well secured login credentials. Robust against an...
Recent Comments