Cybercrime: A Lucrative and Dangerous Underground World The underground world of cybercrime is thriving, with millions of stolen credit card numbers and personal identification details available for mere dollars. This report delves into the activities of digital mobsters who specialize in phishing expeditions, sending millions of scam emails daily. These cybercriminals remain hidden behind digital…
Continue reading ›Articles Posted in Cyber
We are inundated with technologies designed to more effectively communicate. Some have caused users to defectively communicate. Misuse yields communications breakdown or even worse – death by PowerPoint®. With 400 Million Copies of Microsoft Office® and millions of PowerPoint® Presentations every day, one commentator, Dave Paradi surveyed and found several annoying elements in the bane…
Continue reading ›As the use of commercial broadband cable modem’s flourishes, the opportunity for computer criminals or hackers to attack computers attached to these networks similarly has skyrocketed. Unbeknownst to most users, a cable modem provides easy access to an attached computer. Protection of these computers is a three-stage process. A first line of defense against malicious…
Continue reading ›There are secret messages in your documents that are not secret. Both major word processing packages, Word and Word Perfect, contain hidden information that unless carefully removed can be a rich source of information to an opponent to whom the document is digitally distributed. Documents contain far more information than can be seen on screen.…
Continue reading ›Phishing Phishing is not to be confused with ‘fishing.’ There is no cast net, no baiting of the hook, and no minnow awaiting a large-mouth bass. But there are plenty of wireless fly rods out there. What do I mean? Specifically, an enterprising nerd or computer wizard of the binary-off generation can send you a…
Continue reading ›Last year we published an article on securing a cable modem. In the few months since that article, new threats to computer security have arisen. Previously a hardware and/or software firewall coupled with anti-virus protection was sufficient. New threats have arisen from programs that are installed by mere visits to web pages. Recommendations for securing…
Continue reading ›Electronic fingerprints remain available for review if you know what to look for. The skeletal remains of files deleted or history of persons and places visited are seemingly hidden in the world behind the computer’s display. A plan to recover this information by a team with computer forensic expertise can be a powerful tool for…
Continue reading ›