Know Thy Enemy: Tools, Tactics, and Techniques of Cybercriminals

Many view the cybercriminal as an unknown.  This is due, in part, to the difficulty inherent in tracking down individual […]

Full Details

Phishing emails behind notorious ransomware scams revealed

Cybercriminals use phishing emails with malicious links or attachments to distribute ransomware more than any other method. Their goal is […]

Full Details

Ransomware extortionists not as trustworthy as they’d have you believe

There are a variety of different ransomware variants that encrypt your data with no intention of ever decrypting it. There […]

Full Details

The Economics of Extortion: Understanding the ransomware market

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

Full Details

4 ways to avoid holiday phishing on Black Friday

This is the start of the season. No, I am not talking about the Christmas season or the shopping season. […]

Full Details

Cybersecurity Investigation, Prosecution, and Prevention

Join the Cleveland Metropolitan Bar Association Business, Banking & Corporate Counsel Section on Thursday, December 11, 2014, for a panel […]

Full Details
Pyramid Scheme

Pyramid Schemes: Building lies on hopes and dreams

There are many new threats on the Internet, but that doesn’t mean criminals don’t try the tried and true methods […]

Full Details