Blog

The Death of Ransomware?

May 18, 2017 / in Blog / by Zafar Khan, RPost CEO

(WCry) was successful in infecting over 300,000 computers in 150 countries. It is likely the worst ransomware attack to date. WCry works by locking the files with encryption on each device. Victims are promised a decryption key to unlock their files once they pay a ransom of $300 in Bitcoin.

Cyber Pirates Find Silver in Real Estate and Gold in Tech Invoicing

May 16, 2017 / in Blog / by Zafar Khan, RPost CEO

Cyber pirates have found easy prey in real estate brokers, title agents and estate attorneys. Their emails are a treasure trove of information about pending transactions involving large wire transfers. Real estate buyers, eager to close the deal, blindly trust the email they receive and the advisors with whom they correspond.

File Sharing Service Causes Waiver of Attorney Client Privilege

May 04, 2017 / in Blog / by Zafar Khan, RPost CEO

It seems innocent enough. Your attorney shares a few files by sending a link from their unprotected cloud storage account. They expect that you’ll only see the files that they intended to send. But there are huge risks to this approach. This behavior can result in the waiver of attorney client privilege.

EU’s GDPR: Bigger Than Macron or Le Pen

May 01, 2017 / in Blog / by Zafar Khan, RPost CEO

The biggest unifying force in Europe may be cybersecurity regulation. Despite Brexit and the wavering EU support in France, all 28 EU member states are implementing the General Data Protection Regulation (GDPR) which goes into effect in May, 2018.  GDPR will standardize cybersecurity across all 28 member states, including the UK, Brexit or not.

United Airlines and David Beckham — When Emails Leak

April 20, 2017 / in Blog / by Zafar Khan, RPost CEO

What do United Airlines and footballer David Beckham have in common? Disastrous leaked emails. In these recent cases, the leaked emails appear to be legitimate, though Beckham claims some of the leaked emails were “doctored.” But how do we know that leaked email messages discussed in news stories and tabloid columns are actually authentic?