MVP Blog

Search Our Site

Elon_Musk.jpgScammers are posing as celebrities, like Elon Musk, and using their status as a way to get innocent people to give them crypto-currency. These scammers are using similar usernames to the genuine accounts, making them seem more credible.

How Does The Scam Work?

While scammers are impersonating Elon Musk (whose fans were a real target) they then post replies to popular tweets made by the real Elon Musk. This gives their deceiving messages prominence when targeting the celebrity’s fans.  The scammers then ask people to send them small amounts of crypto-currency, offering to send a larger amount back as part of a giveaway.

How To Avoid Being Scammed

The golden rule here is “If it sounds too good to be true, it probably is.” Celebrities are most likely not going to ask you for money to give you back more in return. This concept doesn’t make much sense to begin with, as they have a large amount of money at the start. Celebrities like Elon Musk also have a blue checkmark next to their name to symbolize a genuine account. Never give your password, or any other information to anyone you don’t personally know very well over the internet.



EEG-Headset.jpgEEG is an electrophysiological monitoring method to record the electrical activity of the brain. These headsets allow people to make a ball float in front of them, simply by using their brainwaves. EEG, however, is most often used to diagnose epilepsy, by being able to sense abnormalities in the brain.

Hackers and Brainwaves?

Researchers at the University of Alabama at Birmingham suggest that brainwave-sensing headsets, known as EEG (electroencephalograph) headsets, need better protection and security. A recent study revealed hackers could guess a user’s password by monitoring their brainwaves. How jaw-dropping is this? Now we need to worry about hackers hacking our brains?

What Does This Mean?

In a real-world attack, if more and more people begin utilizing these headsets for gameplay, Virtual Reality, and/or school or work a hacker could facilitate the step required for the malicious program to be initiated through the headset. This program begins by requesting that the user enter a predefined set of numbers to restart the game/program being played or used, after pausing it to take a break, like the way CAPTCHA is used to verify users when logging onto websites. Hackers are becoming more creative as well as dangerous. Understanding how to protect yourself has never been more relevant.


A small robotic dog named “SpotMini” can act as a human assistant in home or office. Unlike other robots by Boston Dynamics, SpotMini isn’t designed to help people in a disastrous situation, but more meant to be a vaguely cute home or office robotic pet. However, is this cute robotic dog now being trained to fight back against humans?

The Robo-Dog That Could

An amazing video of SpotMini went viral after fighting off a human as he tries to open a door. Not only is this slightly uncomfortable and even a little creepy, but the real question is: Why are we teaching robots to fight back against humans?

Enjoy Robots?

If you enjoyed reading this short summary on SpotMini, be sure to check out the video of the door opening robot dog here:

Also, be sure to check out Boston Dynamics for tons of robot videos on YouTube.

Robot Dog



In 2017, the healthcare industry was reported to be hit most frequently by a variety of cyber-attacks. The United States was reported to be the country with the MOST cyber- attacks in the world. That makes the healthcare industry in the U.S. the most targeted and breached industry in the world. Still feel safe?

The Statistics

Here are the top targeted industries hit by ransomware in 2017.

  1. Healthcare: 45%of cross-industry ransomware incidents.
  2. Finance: 12%
  3. Professional services: 12%
  4. Manufacturing: 7%
  5. Education: 6%
  6. Retail: 6%

(Beazley, 2017)

That’s Not All…

The Healthcare industry is also the main target for something known as a W-2 phishing scam. How does it work? Well, cybercriminals use multiple spoofing techniques to mask an email to make it look as if it is from the organization’s executive. The masked email is then sent to an employee in the payroll or human resources department, requesting a list of all employees and their W-2 forms .  According to IRS commissioner John Koskinen, “This is one of the most dangerous email phishing scams we’ve seen in a long time”.

Make sure you and ALL of your employees are as informed and protected as possible. Visit our website to learn more at


What is Bitcoin?

bitcoinBitcoin is a new digital currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middlemen – meaning, no banks! Much of the hype around Bitcoin today is from getting rich by trading it.

How is Bitcoin Used?

While most people are now using Bitcoin as a source of investment hoping for a healthy return, its original use was not for that. The idea behind the technology has always been and remains - one of decentralization - that is, remaining completely independent of a central authority, like a bank, a government, or a country. This privacy is the main reason many users use bitcoin on the “Dark Web.”

Should You Invest in Bitcoin?

As with any investment, this question comes with a set of questions you should ask yourself first:

Do you have the money to risk?

Do you understand fully in what you’re investing in?

What is driving the investment decision?

With these questions in mind, it’s important to understand the risks involved with any investment, especially one as unpredictable as bitcoin is.



Contact Us Today!