CIA sextortion — an old scam with a new twist
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
1124 articles
Scammers posing as CIA agents demand ransom for alleged possession of child porn, threatening arrest.
Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.
Dave and Jeff tackle the latest on the Baltimore ransomware attack, Amazon’s new Alexa patent, recent wins against cybercrime, and more.
Dave and Jeff tackle the latest Facebook allegations, TrickBot causing a day off of school, 5G hang-ups in the UK, and more.
Tempted to stream Game of Thrones free? Be very cautious: You might pay for it with your passwords and credit card details.
Dave and Jeff take on the Airbnb bedroom filming story, ATMs helping stop Bitcoin scams, and more.
A newly discovered vulnerability allows hackers to eavesdrop on WhatsApp users, read their chats, and install spyware just by calling them. Update the app now!
Dave and Jeff talk about Avengers: Endgame scams, trust in social networks, the new royal baby, and more.
This phishing campaign is so convincing that even savvy YouTubers may be duped into giving crooks control of their accounts.
It seems the only reason to buy a “smart” padlock is to make lock-pickers happy.
Dave and Jeff take a look at the latest in the IC3 report, digital clutter, USB devices gone rogue, and more.
Tempted to find the movie Avengers: Endgame online? Be cautious: A lot of websites promise to deliver but collect your passwords and credit card details instead.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
This episode brings you stories of Amazon Alexa, a UK government BCC error, and so-called smart-car apps with hard-coded passwords.
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
Jay Rosenberg of GReAT joins Jeff and Ahmed to recap the second day of the Security Analyst Summit in Singapore.
A cybergang that specializes in cyberespionage, with its campaign mostly limited to the Middle East and countries in central Asia.
How criminals use data harvested from users’ devices to fool antifraud systems and siphon money from victims’ accounts.
Everyone knows that EXE files can be dangerous for computers running Windows. But it turns out that EXE files can infect macOS too.