
Unmasking Empty Threats Scams: How to Spot and Defend Against These Scams
Protect yourself. Empty threat scams are a common tactic used by scammers to create fear and urgency in their victims, ultimately aiming...

Identity Management Day 2023
It’s important to be Identity Smart! Tuesday, April 11th is Identity Management Day, a day of awareness to educate business leaders, IT...

Livermore Valley Chamber of Commerce Workshop - Cybersecurity for Small Businesses
Livermore Valley Chamber of Commerce Workshop - Cybersecurity for Small Businesses https://business.livermorechamber.org/events/details/w...


Discovering the History Behind Secret Societies: Truth or Fiction
I have just completed an audio course on Secret Societies, taught by Professor Richard B. Spence. Professor Spence is a historian who...


International Anticorruption Day 2022
The costs of corruption far exceeds the costs of bribes. Corruption erodes trust in public institutions, undermines environmental...


Cracking the Code: Unveiling the Secrets of the Knights Templar's Authentication Methods
Encryption and Codes: A Historical Look at Authentication Methods Do you think the security measures of the past were effective enough to...


Spot a Scam
In cybersecurity awareness programs, we try to keep people informed of the latest scams. However, it seems like we are chasing a carrot...

Cisco Router Sextortion Scam
Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco...


New Scams April 2019
ACH Scam Vendor ACH request fraud is on the rise. The scam works this way, cybercriminals stalk their prey (research or intelligence...

Recent Scams Feb 2019
Picture from a recent scam email. Email scammers have been around since the early ages of the internet. Every year new types of scams...