Skip to main content

Cybersecurity firm Tiversa accused of blackmailing potential clients

tiversa cybersecurity performs mafia style shakedowns on potential clients h9pkgym
Image Credit: Tiversa
Updated: 6/3/2015 9:53 AM: Robert Boback, CEO of Tiversa, has emailed us in response. He says the statements from Richard Wallace are “wildly inaccurate,” and states that his company “works hard to protect our clients from the risks of cyber breaches.” Boback discredits Wallace’s testimony, citing recent arrests as proof of his unreliability. 

Meanwhile, the House Oversight and Government Reform Committee is investigating the claims made by LabMD and Richard Wallace. The Committee has issued a report that makes a long list of accusations against Tiversa: providing false information to the United States government, fabricating a story about an Iranian IP address obtaining blue prints for Marine One, and possession of classified government documents. 

A verdict has not been reached in the FTC case against LabMD. The judge denied a motion to dismiss the case filed by LabMD on May 26th, and an evidentiary hearing will resume on June 15th.

Accusations have been made against cybersecurity firm Tiversa, as CNN Money reports. The claims suggest the company extorted business prospects into cooperation, and are based primarily on the testimony of Richard Wallace, a former employee of Tiversa, in an FTC case.

The case involves a small cancer testing company in Atlanta, called LabMD, where after being solicited by Tiversa for cybersecurity protection, LabMD declined to use the protection service. Shortly after, LabMD suffered a data breach which caused the loss of thousands of medical records — after which Tiversa continued to pester them to sign up.

After continued refusal, Tiversa allegedly blew the whistle to the FTC, telling the agency to go after LabMD for putting its clients at risk. The subsequent series of lawsuits put LabMD completely out of business, and it was forced to lay off its entire staff of 40 employees last year.

In the end it won’t be hard to find out if Tiversa is at fault or not. If enough evidence is found of companies denying the service and then suffering an attack shortly after, it’s only a matter of time before the trail of breadcrumbs leads back to the guilty party.

Chris Stobing
Former Digital Trends Contributor
Self-proclaimed geek and nerd extraordinaire, Chris Stobing is a writer and blogger from the heart of Silicon Valley. Raised…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more