Anatomy of Cryptophishing – Hydro Project

Cross-posted to “AdventuresInCyberSecurity.com” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people … Continue reading

#Cybersecurity Predictions for 2016

Picture from sigstr.com. It’s that time of year! Time to make predictions for the upcoming year, and as I like to do, I like to try and make them in my field - cybersecurity. These are just my guesses, speaking for myself - I am in no way representing my employer or anyone … Continue reading