Learn to Spot a Phony!

Phone scams are a type of social engineering scam, which seek to dupe often busy recipients into disclosing sensitive information or providing seemingly harmless responses to questions. This article reviews some of the common phone scams and provides recommendations and best practices. More →

Digital Dérive

You’ve arrived at a train station. Exactly where it is, who can say? Exactly what brought you here? That’s unclear. Maybe you’re searching for something, or running away from something. Maybe you just felt like wandering. As you stand on the platform, a guitar player attracts your attention. He seems to know more about you than you know about him, or about yourself. More →

Phishing, Spear Phishing, and Whaling

Workplace and personal email have become the most common attack surfaces for opportunistic and targeted phishing scams. Phishing scams use social engineering to target end users. There are variations of phishing, which have distinguishing features that may be categorized using terms such as spear phishing or whaling. More →

Capturing a Face: Bjork, Masks, and 3D Scanning at LaGuardia Studio

Icelandic musician Bjork has long been interested in the intersection of technology and nature and is an enthusiastic early adopter of emerging technology, while MIT’s Neri Oxman’s specialty is designing 3D printed objects using innovative materials that relate to and are designed by biology, based on scans of Bjork done at NYU’s LaGuardia Studio. More →

Ransomware Scams

Ransomware is malware that tricks users into installing itself on their devices. Ransomware scams most commonly occur via email social engineering scams, a/k/a phishing scams. In ransomware attacks, malware encrypts a user’s files and requests ransom payment, often in bitcoin, to unlock the files and restore encrypted content to users. More →