-
Identity Theft Isn’t Child’s Play: Protecting Your Baby’s Financial Future
Criminals love youngsters because they can mortgage their innocent futures with little consequence. Children and infants are attractive targets for identity thieves because their Social Security numbers (SSNs) are clean and unused. Thieves can use these SSNs to apply for credit, open bank accounts, or obtain government benefits, and the fraudulent activity may go undetected… Read more
-
Cybercrime as a Business
Cybercrime has evolved into a sophisticated and organized business model, adopting principles and functions similar to legitimate enterprises. Criminal organizations involved in cybercrime operate with a high degree of specialization, coordination, and efficiency. Here is an overview of the various functions and departments within a modern cybercrime enterprise: Management and Leadership Cybercrime organizations exhibit a… Read more
-
An Introduction to ACH Security
ACH (Automated Clearing House) payments are subject to federal regulations and are managed by the National Automated Clearing House Association (NACHA). To register within this network, users must provide the following information: These registration steps bear similarities to the Payment Card Industry Data Security Standard PCI-DSS for credit cards. But ACH payments are not obligated… Read more
-
Emergency Management in Montgomery County, Maryland
Emergencies and disasters can strike without warning, and Montgomery County, Maryland, is no exception. In his October 29, 2023, presentation to the Montgomery County (Maryland) Citizen Academy Alumni Association, Patrick Fleming, Emergency Preparedness Specialist, with the Montgomery County Office of Emergency Management and Homeland Security (OEMHS), described the potential hazards faced by Montgomery County, the… Read more
-
AI and Our Adversaries
The September 2023 installment of Crowdstrike’s Adversary Universe Podcast covered Artificial Intelligence’s potential for strengthening adversarial attacks. Adam Meyers and Cristian Rodriguez raised several key points to for the cybersecurity profession to consider: Meyers and Rodriguez underscore the complex and evolving nature of AI’s role in attack campaigns. As is the case with most technological… Read more
-
Beware of AI Phishing Emails
How Novice Black Hat Hackers Are Using Artificial Intelligence to Steal Your Personal Information A new underground tool known as WormGPT has emerged, presenting a disturbing development in the realm of generative artificial intelligence (AI). Unlike its ethical counterpart ChatGPT, WormGPT lacks abuse prevention mechanisms, making it a potent weapon for cybercriminals. The discovery of… Read more