It is not necessarily all about the money By way of introduction, I will kick off our public fraud investigation blog in a somewhat unorthodox fashion with some comments on an article in Swimming World Magazine entitled, “Doing the Right Thing” (Jason Marsteller, January 2015, pp. 18-19). The reason for choosing this article about cheating in […]
Monthly Archives: January 2015
Service Provider Blocks Tor to Silent Circle Claiming Security Threat
Service Provider Blocks Tor to Silent Circle Claiming Security Threat January 21 2015The Claim:”Tor exist nodes are routinely used as methods by Threat Actors to exfiltrate data from compromised endpoints. As an example, the Financial Sector has seen significant issues from them.“ FireHostThe Issues:• Bad guys use it; let’s treat everybody as bad guys • […]
Email insecurity video
This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let’s start with something that has become an indispensable tool for communication in our world and I’m referring to the email. Email can […]