"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreMicrosoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.
Read MoreA former employee is sent to jail for creating "infinite loops". We examine how non-terminating threads can crash critical systems.
Read MoreQuantum threats are increasing. Is it time to do away with encryption? We examine how encryption works today and will likely work tomorrow.
Read MoreAn employee steals $100K from her employer, in part by opening new lines of credit. We comment on practical steps employers can take to tighten authorization, monitoring, and enforcement to prevent employees from opening credit lines.
Read MoreA new survey states that most U.S. workers are ready and willing to decline extra work. Is that how it works in your organization? We want to know.
Read More"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreA survey reveals most employees feel protected at work, but many employees report different forms of wrongdoing. We chime in and want to know your opinion.
Read MoreMicrosoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.
Read More