Woman browsing on her mobile phone

How behavioral biometrics can stop social engineering and malware scams dead in their tracks

Woman browsing on her mobile phoneSuppose you get a frantic call from your aunt, Rose. She tells you that she’s been contacted by IRS collection officers and she owes them money. While on the phone with her, the “IRS” coached Aunt Rose on how to pay, which included prompting her to log in to her bank account and wire them money, which she did. Aunt Rose has just been scammed — or more accurately, coached. Also called coercion or social engineering with user interaction, coaching

Read More >

A hacker saving some cents

How Hackers Can Pull a Data Breach Without Dropping a Cent

A hacker saving some centsFree tools, tutorials, easy-to-run software, and, if that wasn’t enough, there is also Shodan; an engine to find devices connected to the internet in real time. All these tools are a big pot cybercriminals use to stir up a tank of trouble. They are winding up the internet giving even the most talented of white hats a run for their money. Five countries – Australia, Canada, New Zealand, UK, and the U.S. – have already warned that everyone from individual

Read More >