Generative AI Is Accelerating Social Engineering
Social engineering relies on trickery and persuasion rather than technologically skillful cyber attacks. Threat actors who use social engineering tactics don't exploit systems. They exploit trust. They hack people. Deploying tactics of psychological manipulation targeting human vulnerability threat actors continue to experiment with artificially intelligent tools to enhance realism and ...
Continue Reading
Continue Reading
Cybercrime Syndicate Indicted in U.S. Health Care Fraud Scheme
The playbook was simple. Purchase legitimate medical supply companies enrolled in Medicare and use them as shells to submit a flood of bogus claims for durable medical equipment. The scheme didn't need phony patients. The stolen identities of a million people were used to submit claims under real names. But ...
Continue Reading
Continue Reading
The Privacy Implications of Artificial Intelligence
The relentless collection of personal data is a persistent threat to privacy and freedom in the evolving era of artificial intelligence. The privacy implications of web scraping, social media monitoring and harvesting of biometric data are far-reaching and undermine the right to personal autonomy. Maintaining control over personal information is ...
Continue Reading
Continue Reading
North Korean Money Laundering Tactics Exposed
The United States Department of Justice has filed a civil forfeiture complaint alleging that North Korean information technology workers obtained illegal employment and generated millions for the North Korean government as a means to avoid U.S. sanctions. The U.S. government was able to freeze and seize over $7.74 million tied ...
Continue Reading
Continue Reading
Money Laundering in Canada
Money laundering is pervasive, clandestine and transnational. Measures to combat money laundering have been implemented by most states and have become integral tools at the disposal of national and transnational law enforcement. In this post I will discuss what money laundering is and the various means that are commonly used ...
Continue Reading
Continue Reading
What Is Cybercrime?
Cybercrime transcends national borders and includes a range of offences generally associated with a profit motive such as fraud, extortion and identity theft. Cybercrimes that involve at least one state actor are often referred to as cyberwarfare. Cybercrime not only impacts security of the person but also implicates the broader ...
Continue Reading
Continue Reading
Former Taliban Commander Pleads Guilty to Hostage Taking
A former Taliban commander who once led a thousand militants has pleaded guilty in a New York court to hostage-taking and providing material support for terrorism. The guilty pleas came almost twenty years after the abduction of an American journalist and the killing of three U.S. soldiers during the bloody ...
Continue Reading
Continue Reading
The Citizen Lab Report on Paragon Spyware
Spyware is installed on an electronic device remotely without the knowledge of the user. It functions as a silent intruder that covertly collects information and sends it to a third party without the consent of the user. Passwords, web browsing history and banking information are common targets. Spyware on mobile ...
Continue Reading
Continue Reading
The Gun in the Glove Compartment
The doctrine of constructive possession is a legal fiction used to describe a situation where an individual has knowledge and control of an object without having physical custody of it. The doctrine came into play during a recent trial in the Ontario Superior Court of Justice that stemmed from the ...
Continue Reading
Continue Reading
Conviction of Former Uber Chief Security Officer Affirmed
The conviction of former Uber chief security officer Joe Sullivan on obstruction of justice and misprision of a felony charges has been upheld by by the U.S. Court of Appeals for the Ninth Circuit in San Francisco, California. The charges related to his attempted cover up of a security breach ...
Continue Reading
Continue Reading