I Caught You, Pervert! Phishing Scams and How to Protect Yourself

Man trying to make a Phishing attempt

Earlier this week I was contacted by an old friend who was nervous about potentially having been hacked. The message read something like this: “I got this email saying they caught me doing something disgusting. They claim to have hacked my accounts and want Bitcoin, or they’ll share everything with my friends and family. They sent it from my own email address! Is this real? Am I screwed?” We met up at a café in a grey and rainy Helsinki, her laptop and phone between us, the screen still displaying…

Read More

The Double-Edged Sword of Crypto’s Global Rise

The Double-Edged Sword of Crypto’s Global Rise

After 6 years of working with cryptocurrencies on a deeper level, one thing is certain; Cryptocurrencies are no longer niche.  For us, who are analysing trends and adoption from the slightly colder latitudes on earth, we can safely say that with over 10% of Finland’s population now owning crypto, the trend mirrors what we’re seeing globally. From the United States to Southeast Asia, Bitcoin, Ethereum, and countless other digital currencies are steadily becoming household names. This rise has been bolstered by the kind of headlines that stir excitement—El Salvador’s President…

Read More

The World of High-End Investigators: A Glimpse Into Financial Crime, Cyber Threats, and Counterterrorism

The World of High-End Investigators

When you hear the term “private investigator,” your mind might conjure images of trench coats, dark alleys, and grainy surveillance photos. But in the world of high-end investigators, it’s a whole different game. Forget the noir clichés—these specialists operate at the bleeding edge of technology and law enforcement, tackling challenges like financial crime, corporate espionage, and counterterrorism. This isn’t about catching cheating spouses or tracking down lost pets. High-end investigators are the professionals called in when millions are missing, secrets are stolen, or entire organisations are compromised. Who Are These…

Read More