-
Finding Fraudsters on the Open Web
They’re shifty fellows, alright! And that’s saying something coming from a lizard with a mood ring for an epidermis. The second you think you got these phishy fraudsters pegged, poof! Off to some shady corner of the web. Keeping up with them? Let’s just say it’s trickier than blending in at a kaleidoscope convention (ask…
|
-
Scamming the Scammer
🚨 SPOILER ALERT: This article shares IoF (Indicators of Fraud). Yeah, I just made that up. They say knowledge is power. So when I got a random text from (470) 361-8476 asking, “Wendy [Not my real name], are you going to play golf this weekend?” they had no idea who they were dealing with. If…
|
-
Call Me Gordon McPhish
Immersed in the academic bubble of Georgia Tech’s Master’s program, it’s pretty common to get a bit of a one-sided view of the real world. Exploring the world of machine learning for Intrusion Detection Systems (IDS) and how malware can outsmart these systems is downright intriguing. Yet, truth be told, your average cyber crook isn’t…
|
-
Transforming with Holehe-Maltego
Hello Maltego! A software that’s all about Transforms? Sounds like my kind of software. It’s free?! Could this get any… oh wait… Ok, so join the club of hundreds if not thousands of software options with a free download and premium subscriptions. From video games to corporate level software solutions, it’s the same old bait…
|
-
Anonymizing Your Sock Puppets
You’re not real without your phone! At least, that seems to be the conclusion much of internet has reached. When so much of the online ecosystem revolves around tracking and selling your personal data, there are very real financial concerns when it comes to validating the identity of users for major social platforms. Unfortunately, blending…
|