article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Often, a scammer will simply target the people in a company and fool them into giving up their personal details, account passwords, and other sensitive information and gain access that way. However, the technological side of cybersecurity is no longer the weakest link in a company’s proverbial chain. costing an estimated $18.88

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.