"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreMicrosoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.
Read MoreA former employee is sent to jail for creating "infinite loops". We examine how non-terminating threads can crash critical systems.
Read MoreQuantum threats are increasing. Is it time to do away with encryption? We examine how encryption works today and will likely work tomorrow.
Read MoreA new survey states that most U.S. workers are ready and willing to decline extra work. Is that how it works in your organization? We want to know.
Read More"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.
Read MoreA survey reveals most employees feel protected at work, but many employees report different forms of wrongdoing. We chime in and want to know your opinion.
Read MoreMicrosoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.
Read MoreAn executive goes to jail for illegally reselling IP back to his employer. We outline practical governance, contracting, and oversight steps to reduce this hidden fraud risk.
Read More