Hackers

United Airlines and David Beckham — When Emails Leak

April 20, 2017 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

What do United Airlines and footballer David Beckham have in common? Disastrous leaked emails. In these recent cases, the leaked emails appear to be legitimate, though Beckham claims some of the leaked emails were “doctored.” But how do we know that leaked email messages discussed in news stories and tabloid columns are actually authentic? United Airlines’ PR Nightmare   United Airlines’ CEO Oscar Munoz appears to have dug himself into a deep hole [...]

The Honeypot for Hackers: Twitter Heats Up

March 31, 2017 / in Blog, General / by Zafar Khan, RPost CEO

The average Internet user has over 100 online accounts, according to Dashlane. Who on earth can keep track of that many accounts? No one really. That’s why millions of people use password managers to keep their passwords encrypted and organized. Typically, password managers are apps that encrypt and store your passwords in the cloud or locally on your computer, requiring you to use just one secure password to access all your passwords. Convenient, right? So what’s the problem? [...]

Why Hasn’t Anyone Thrown Out Their Microwave?

March 17, 2017 / in Blog, General / by Zafar Khan, RPost CEO

Were you shocked to learn that Wikileaks had published “Vault 7”, leaked documents that reveal the intricate details of CIA’s hacking capabilities? Were you extremely concerned that the CIA has now “lost control” of these tools to the public domain, meaning that any cybercriminal in the world can now learn these methods and use them against you? Did the recent news cause you to take a long and close loo [...]

Internet Cameras and Masking Tape

December 09, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Earlier this year, Mark Zuckerberg, CEO of Facebook, unintentionally revealed (in a photo he posted to his Facebook account) that he covers up the webcam and audio port on his laptop. He literally has a small piece of masking tape over the pea-sized camera lens and another one on the audio port where headphones plug in. The social media universe was quick to pick up on this, leading to all sorts of speculation and theory crafting about the possible implications. What d [...]

The Race to Control Your Home: Artificial Intelligence is Here

November 18, 2016 / in Blog, General / by Zafar Khan, RPost CEO

Even as early adopters today are already speaking with their household appliances, lighting systems, home security network, and computing devices through cutting-edge artificial intelligence (AI) enabled systems, one question comes to mind. Which AI system will lead the way to eventual mass market adoption: Amazon’s Alexa, Apple’s homeKit, Microsoft’s Cortana personal assistant, or perhaps the recently announced Google Assistant? Each system offers a fast-growing dose of cloud-enabled arti [...]

Tips for Staying Cyber Safe on The Road

August 26, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

Next week marks the last official week of summer vacation. It is likely also the beginning of your “back to work” business travel. Business travellers should note these specific precautions when conducting business transactions from the road, especially if you are likely to be more focused on the speed of getting things done rather than security. Be vigilant when using public Wi-Fi networks available from airports, hote [...]

Shadow Brokers Release NSA Hacking Tools to The Public

August 18, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

A hacking group called Shadow Brokers has reportedly stolen powerful hacking tools from the Equation Group, a hacking group believed to be NSA-backed and responsible for many of the largest state-level hacks in history. On Saturday, Shadow Brokers released a subset of [...]

Russian Hackers and Pig Latin

August 03, 2016 / in Blog, General / by Zafar Khan, RPost CEO

With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections or “Brexit” votes, or the pervasive pressure to comply with HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential exposure, and its mere use can demonstrate [...]

DNC Leak: Russian Hackers or Inside Job?

July 26, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

…and does it change the result? Who is responsible for the recent Democratic National Committee (“DNC”) hack and resulting emails published on WikiLeaks? Russian hackers are suspected and the FBI is investigating, but Russia adamantly denies involvement. The hackers could be from the same group who stole DNC’s oppositional research about Republican Presidential nominee Donald Trump in mid-June. Perhaps, the perpetrator is simply a DNC employee or subcontractor disen [...]

Online Ads Provide Hacker Entry Point

June 23, 2016 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers. This upfront investment (in social media marketing tools, for example) permits hackers to tailor their message such that it appe [...]