Anatomy of Cryptophishing – Hydro Project

Cross-posted to “” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people constructing them don’t go through a lot of effort. I received one today that was […]

Read More Anatomy of Cryptophishing – Hydro Project

On Hacking Automated Trucks #cybersecurity #y2k #iot

Regarding this article from a post on Linked In: Is #cybersecurity the #Y2K of this generation? This author seems to think so. This is telling: “Yes, that [hacking automated trucks] is possible, but the designers of these systems are aware of the issue and are putting measures in place to avoid it.” This completely […]

Read More On Hacking Automated Trucks #cybersecurity #y2k #iot

U.S. Government Releases “Proof” of U.S. Election Hacking by Russians

Gary Markstein, as above. Edit: Original post still below, but I’ve been informed by several of the Threat Researchers with whom I work that this report is not supposed to be considered as the government’s proof, merely things that organisations can use in order to protect themselves. With that understood, it still furthers a narrative […]

Read More U.S. Government Releases “Proof” of U.S. Election Hacking by Russians

Google Pixel XL (128GB) Review

I own a Google Pixel XL in Very Black with 128GB onboard storage. I have had a Samsung Galaxy Note since the first one. I still have my Galaxy Note 4. (Actually, I have two of them! Unfortunately, I couldn’t go any further with the Note series for two big reasons. Samsung in their <sarcasm>infinite […]

Read More Google Pixel XL (128GB) Review

Malware via Email

I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]

Read More Malware via Email