Older adults are vulnerable

These older adults are beloved by scammers due to the following factors:

  • Being trusting / not suspicious
  • Giving nature
  • Having time on their hands
  • Often have lots of funds
  • Not tech-savvy

Senior Cyber — the book to help grandma avoid being scammed

This article was originally published in CSO in 2015. See important update at the end.

The Cyber NTSB

In his book The Psychological Edge: Strategies For Everyday Living, clinical psychologist Dr. Samuel Shein writes that while we have a National Transportation Safety Board (NTSB), there is no National Psychological Research Board (NPRB). A group like the NPRB could investigate national disasters caused by those with psychological issues. Even with tragedies such as the Columbine High school and Sandy Hook Elementary school massacres, to the Heaven’s Gate mass suicide, 9/11, and more, the US still lacks a central agency dealing with psychological-based tragedies. …

By listening to these calls with phone scammers, you can avoid being a victim.

Here is an ongoing list of audio recordings from scammers, based on my articles An easy & foolproof way to get phone scammers to hang up on you, and From Amazon Returns to Extended Auto Warranties — How Not to Get Scammed When Your Phone Rings.

Listen to their method, understand their tactics, so you, your friends and family, can avoid being their next victims.

Amazon scammers





77 — the last 2 minutes where he goes into a foul-mouth tirade is deleted.


87 — This…

There is no lie, we did land on the moon. There is no basis to this conspiracy theory.

Suppose the US really did lie and the entire moon landing program was a hoax. How would we know that? Very simple, Russia would have brought it to the world’s attention.

Russia and the US were in a cold war. Russia had moles and spies in NASA who would have known it was a hoax. Russia would have been the first to highlight that fact. And their silence says a lot.

Yes, we landed on the moon, and there is no conspiracy at all.

The recruiters you use may be sabotaging your job search.

Don’t throw your resume to the wind

One of the most desperate situations people find themselves in is when they are suddenly out of work and need a job. Those on LinkedIn or with a Monster account often quickly send out their resume to everyone and anyone, including recruitment agencies, they think can help them, no matter how remote. And while that is a desperate approach, it may also, in fact, be hijacking their efforts to find a new job.

There are two elements at play here. First, when you send your resume to a recruiter, you…

Because it’s but one application in your privacy portfolio

A non-scientific estimate tells me that almost everyone I know, and their friends use WhatsApp. WhatsApp has been in the news recently, with many stories, most of them negative, as their terms of service and privacy policies are changing. Most specifically, that WhatsApp will be sharing data with Facebook, their parent company.

While WhatsApp just pushed off those changes to March 2021, the underlying question is: should you stop using WhatsApp and use an alternative messaging application like Signal or Telegram that is more privacy oriented? Like most security and privacy questions, the answer is “it depends.”

If you are…

Every call you get is from a scammer — the plague of 2021

You can easily avoid being a victim of these multi-billion dollar frauds by knowing their techniques and characteristics, which is what this article is about.

Grandma and Grandpa are particularly vulnerable.

It’s hard to believe that it’s been a year since I wrote The Best Information Security Books of 2019. With that, here is my list of the Best Information Security Books of 2020

Security book of the year

Medical Device Cybersecurity for Engineers and Manufacturers — Axel Wirth, Christopher Gates and Jason Smith

In September, it was reported that a patient in Germany died when ransomware disrupted emergency care at the hospital. After an investigation, it was determined that the patient was in such poor health that she would have died anyway and that the ransomware attack was not ultimately responsible for her death.


Your cloud environment is a veritable digital mint for cryptojackers. If you don’t secure it, they will come.

In part 1 of this article, I gave an overview of the concept of cryptomining and cryptojacking.

Here in part 2, my Tapad colleague Husnain Bustam, cloud security engineering, and I will provide guidance and advice on securing your cloud environment from illegal cryptojacking.

Cryptojacking is a very real threat

Ben Rothke

I work in information security at Tapad. Write book reviews for the RSA blog, & a Founding member of the Cloud Security Alliance and Cybersecurity Canon.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store