Featured

How the Coronavirus Enabled the Twitter Hack (*and others too)

The recent hack of Twitter demonstrates how the hacking community targets high-profile users on high-profile networks not only for fraud, but also for attacks on their privacy and attacks aimed at “piggybacking” off their identity and celebrity. While the identity of the hackers is still under active investigation, there are a few things we know (and more that we suspect) about how and why the hack occurred. And part of the problem is COVID-19…

Read More How the Coronavirus Enabled the Twitter Hack (*and others too)
Featured

Black Market White Washing: Why You Shouldn’t Take Legal Advice From Criminals

By Allison Nixon Fraudsters who operate shops in criminal marketplaces are constantly massaging their marketing pitches to assure prospective customers (and lurking law enforcement) that their service is legal. It’s become clear recently that some infosec professionals can’t seem to identify these services as bad, so these marketing efforts may have succeeded for one audience. […]

Read More Black Market White Washing: Why You Shouldn’t Take Legal Advice From Criminals
Featured

Zero Factor Authentication

By Mark D. Rasch and Allison Nixon In the Simpsons episode, “Bart vs. Lisa vs. the Third Grade,” the siblings are both abandoned while on a school trip despite the fact that Mrs. Crabapple, the teacher, had deployed a mechanism to ensure that all people on the bus were accounted for.  As she explains, “Ah, […]

Read More Zero Factor Authentication