The Exit Scam Workmines recently did an exit scam that left sad and confused users hopeful that they would be back. Since the site went down on June 6, 2019, users received promises that ...
WorkMines: One of the Latest Exit Scammers
What is Workmines? Workmines is one of the “Make Money Online” or “Work from home” websites. It promises to pay its users to watch videos (mostly Netflix trailers). They offer different plans ranging from ...
A Man, Berry van M, Arrested Over 26 Million Euros Bitcoin Fraud
A 33-year-old resident of Apeldoorn is facing charges related to fraud, forgery and money laundering after he was arrested on Monday. Authorities reveal that he earned over 26 million Euros by fraudulently convincing people ...
Huawei’s ‘HongMeng’ Operating System Set to Progressively Replace Android
How it All Started Huawei’s business progress was threatened on Sunday (May 19, 2019) when Google pulled its license to use Android OS. Google revoked the license in order to comply with an executive ...
Hackers Transfer Over $7 Million Worth of Ethereum Tokens to an Unknown Wallet in What is Suspected to be Related to Cryptopia Hack
A cryptocurrency exchange in New Zealand going by the name Cryptopia which was hacked earlier this year continue to hit the headlines. An attacker breached the site and stole funds from Cryptopia’s Ethereum wallets. ...
OGusers Account Hijacking Forum Has Been Hacked
Approximately 113,000 forum users’ IP addresses, emails addresses, hashed passwords and private messages were exposed after an Account Hijacking Forum going by the name OGusers was hacked. The [.com] site is known for SIM ...
The Telecommunications Act of 1996 Creation and Importance to Service Carriers
Question We have come a long way since the invention of the telephone by Alexander Graham Bell, and yet, many of us do not know what POTS is. Explain in your own words why ...
Explain What a Security Incident Response Team Handles
What is a Security Incident Response Team? Security incident response team, according to Rhodes-Ousley (2013), is a panel made by combining employees from different departments in an organization to respond to a security incident ...
Explain the Different Security Positions Within Information Security
Information Security Job Groups or Positions Information security, like any other job, has employees ranked into specific positions or job groups. Each security position has its responsibilities and challenges that the stakeholder in charge ...
Explain Policy Categories and the Form and Organization Components
Classification of Security Policies Rhodes-Ousley (2013) classifies security policies into three elementary categories namely: Regulatory policies, advisory policies and informative policies (p.111). Irrespective of the category, security policies can only be effective if they ...