The many faces of impersonation fraud: Spot an imposter before it’s too late Posted on April 20, 2024 What are some of the most common giveaway signs that the person behind the screen or on the other end of the line isn’t who they claim to be?
The Inability to Simultaneously Verify Sentience, Location, and Identity Security Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma”… rooter August 11, 2023 1 min read 0
AI and Voter Engagement Security Social media has been a familiar, even mundane, part of… rooter November 18, 2025 10 min read 0
CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog Security U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft… rooter March 27, 2024 2 min read 0
Who is Ultimately Responsible for Business Email Compromise? Security Business email compromise, commonly known as “BEC” has become a… rooter October 9, 2025 1 min read 0