How to Attend One of Our Acclaimed Presentations

What do a federal prosecutor, financial analyst, and private investigator think about Bitcoin, the Silk Road, and ICOs? Our leading experts will be covering this and more in their upcoming presentation to the Entrepreneurs’ Organization in Seattle on September 28, 2017. We have presented internationally to various EO, law enforcement, … Read More

SEC Vulnerability May Be Responsible for Insider Trading

The Securities and Exchange Commission has been a leader and enforcer of cybersecurity requirements. However, even the SEC is vulnerable as they recently announced a 2016 data breach that might have given hackers access to private information that could easily have been used for illegal trading. SEC Chairman Jay Clayton … Read More

How Apple Is Changing the Security Game

With the announcement of the new iPhone X came a surprising new security feature: facial recognition. Introduced as Face ID, the new form of biometric authentication is far more secure than other facial recognition systems on the market as well as Apple’s own fingerprint identification Touch ID. Face ID is … Read More

Are Text Messages Community Property?

Does your spouse have the legal right to retrieve your text messages, emails or photographs for use during a divorce proceeding? Is your smartphone community property in the eyes of the law? If so, are all of the communications on that smartphone also community property and therefore fair game? The … Read More

Ransomware Attacks on SMBs Targeting IoT Devices

Ransomware attacks targeting IoT devices are expected to increase dramatically in the coming years, from around 10% of attacks to 30%. IoT devices are rapidly becoming a popular target due to their relative lack in security features. IoT devices currently usually only run a simple firewall or antivirus software. These … Read More

What the Media Hasn’t Told You About the Equifax Hack

If you’ve taken a look at the news in the last few weeks, you’ve likely heard about the disastrous hack of Equifax and the subsequent loss of personal and financial information of 143 million people.  As horrible as this is, there are other facts about this incident that aren’t receiving … Read More

Encrypted Messaging App Linked to Failed Turkish Coup

In July 2016 a portion of the Turkish military attempted a coup to destroy the government and remove President Erdogan from power. After the coup was countered, the Turkish government labeled Muhammed Fethullah Gülen as the leader of the attempted coup. The Turkish intelligence agency investigated the origins of the … Read More

Your Identity’s Value on the Darknet Will Surprise You

You probably consider your personal data to be worth an extreme amount; either very high or very low. But how much does an identity thief think you’re worth? About $10. Verified high-limit credit cards from the U.S., Japan, and South Korea are being sold on the Darknet from $10 to … Read More

Hackers’ Identities Vulnerable with Tor Flaw

Zerodium, a company that specializes in buying and reselling zero-day exploits announced it will pay up to $1,000,000 for any current zero-day exploits for Tor. Zero-day exploits are any weakness in a program that the manufacturer does not know about out. In essence, Zerodium is offering to buy knowledge of … Read More

Your Soon-To-Be Ex-Spouse Can Easily Hire a Hacker

These days it seems like you can’t go anywhere online without hearing about another high profile hacking case or seeing another article promising the secrets to keeping your information safe. While these tips are certainly helpful, and you can read some of ours here, none of them seem to explain … Read More