How do you handle antivirus alerts

That depends on the policy behind antivirus incidence.

Should be alert be for a legitimate file, it can be white listed.

Upon the incident being positive and a malicious file being in the system, it needs to be quarantined and delete it.

After the quarantine the source of the file needs to be checked in order to determine where it came from and where the vulnerability is in order to prevent future incidents.

Overtime these anti-virus alerts can be fine-tuned so that’s the frequency of alerts can be reduced.

About John Cryan and the nonsense of the cashless society

In his speech at the world economic forum in Davos The former Deutsche bank CEO was one of many to support the quest to rid the world of cash.

Again, he stands in a long line of defenders of this practice.

And while it is true that a large quantity of crime is being committed on the back of cash, the alternative is much more Grimm.

I work together with a variety Of crisis response companies Who reacts to cases of kidnapping and ransom, extortion, and similar risks.

Unanimously these companies I work with sai dad’s paying a kidnapper in conventional currency is one of the most promising factors to retrieve the loot, and to trace the assets back to an individual or organization.

So his cash were taken out of the equation entirely, criminals would resort to alternatives.

In the recent past, and increasing amount of kidnapping around some cases have been changed in appearance by the perpetrators requesting bitcoin and other crypto currency’s in favor of dollars, euros, and other conventional currencies.

The problem is that crypto currency is in general very difficult to trace.

If done right a bitcoin can be in obfuscated that it will never be able to be traced.

The dark web would not be the dark web if it hadn’t invented algorithms to support these types of obfuscation.

Once these have been utilized, criminals often take their new and washed with calling to introduce them to an offshore casino there by entirely eliminating any trace that the crypto currency, which is now conventional currency, was used in a crime.

@Cloudflare and @TorProject: Speeding up #Privacy

One of the most annoying things when using TOR browser, and surfing to conventional websites using Cloudflare CDN was that you got a reCaptcha.

More often than not this would not happen once, or twice – but multiple times over before you actually got the content you wanted.

Appearently, this has changed because in September Cloudflare annouced that it worked together with the Tor Project to mitigate this annoying issue, but in the course of their coop, they actually found a genius way to make Tor faster with their technology.

This is great for those seeking privacy… yeah, I know… the criminals, too. But hey, you can use a knife to cut onions. Oh, wait – stupid analogy…

This just as a heads up… go to the website to read the technicallities yourself; and how to activate them in the case you run a .onion TLD website.

The most complex case of CEO Fraud… yet; and how to mitigate it.

CEO fraud was probably one of the most devious forms of cyber crime. Above that, it is the highest form of social engineering.

Do you know that feeling when you get to a project and you’re thinking: how in the hell could this have happened?

Recently happened to me in the form that I was called, and sitting in a helicopter being airlifted to a midsized organization in which The most complex case of the CEO Friday I’ve seen today it had happened.

In short: the perpetrators head injected malware into the email server of the organization, thereby being able to monitor both the CEOs and the CFO$ mailboxes permanently.

The CEO was about to contact to deal with an organization in London, and all of his itinerary was in his mailbox; even The telephone number of his hotel.

Long before this happened, the perpetrators had hired someone with a similar voice to that of the CEO, and above that spoke his native language. The CEO used Voice Memos frequently, which allowed the perpetrators to also copy a style of speaking.

The CEO arrived in London, and the deal did not come to fruition. However, the perpetrators called the CFO and the organization, and the impersonator they had hired claimed that the deal had in fact been signed.

The impersonator then gave the CFO the bank details upon which DCF I will execute the transfer of €25 million.

Upon the CEOs returned to the organization into the office A day later to see if I congratulated him to the deal closure.

The CEO then replied that the deal had not been closed, and the things started to unravel

The damage turned out mildly, and we put the necessary precautions and methodology is in place so that the kids like that can never repeat again; at least not with this organization.