Impersonation

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

5dbdfb006bfb96cb7115ce3a5a985171

Online Self-Policing: Check Yourself Before You Wreck Yourself

June 11, 2015 Added by:Lisa Huff

As we post to Facebook and Twitter, and share pictures via Instagram or Pinterest, we don’t stop to think about how our posts or pictures could come back to haunt us later in life.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Forget About IOCs… Start Thinking About IOPs!

June 10, 2015 Added by:Ronnie Tokazowski

For those who may have lost track of time, it’s 2015, and phishing is still a thing. Hackers are breaking into networks, stealing millions of dollars, and the current state of the Internet is pretty grim.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Researchers Track Subway Rider’s Movements Through Mobile Phones

June 09, 2015 Added by:Anthony M. Freed

A team of Chinese researchers say they have devised a methodology to track the movements of subway riders through motion detectors that are standard features on most mobile phones.

Comments  (0)

Bbd4f9420cc0edec55cb25411422efd2

Disrupting an Adware-serving Skype Botnet

June 08, 2015 Added by:Ronnie Tokazowski

In the early days of malware, we all remember analyzing samples of IRC botnets that were relatively simple, where the malware would connect to a random port running IRC, joining the botnet and waiting for commands from their leader. In this day and age, it’s slightly different.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Tox: Free Ransomware Toolkit Hits the Black Market

June 04, 2015 Added by:Anthony M. Freed

Do-it-yourself malware toolkits have been available on the black market for a long time, but now researchers have discovered the first ransomware variation for creating your own extortion campaigns – and it’s free to use.

Comments  (0)

Default-avatar

Surfing the Dark Web: How Attackers Piece Together Partial Data

June 04, 2015 Added by:Aaron Higbee

There is an entire cottage industry of people who go to great lengths to upgrade partial data to make it more valuable. On the Dark Web, one can easily find postings buying and selling this kind of partial information.

Comments  (0)

96f253cc8b3e78f1160a605fb9b56530

More Than Meets the Eye

May 28, 2015 Added by:Chris Elisan

The philosophy of hiding in plain sight has been used both by the good and the bad guys. But the effect of hiding in plain sight is much more pronounced when applied to a malicious attack.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Embracing Cyber Resilience in Today's Cyber-Enabled World

May 06, 2015 Added by:Steve Durbin

Organizations function in a progressively cyber-enabled world today and traditional risk management isn’t nimble enough to deal with the risks from activity in cyberspace. Enterprise risk management needs to be extended to create risk resilience, built on a foundation of preparedness.

Comments  (0)

6a71825dbf6d876764b845e0fd664e0b

5 Ways Schools Can Upgrade Cyber Security

May 06, 2015 Added by:Paul Lipman

Today’s cyber criminals are more aggressive than ever before in their quest to achieve financial gains through hacking. With that being said, it should come as no surprise that our nation's schools are a prime target for such attacks. In this article, iSheriff CEO Paul Lipman highlights the five actions that can be taken to upgrade cyber security practices.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

This Carding Forum is Spamtacular

May 05, 2015 Added by:Malwarebytes

Credit card fraud is a huge problem, and by its very nature falls across the entire security spectrum.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

The Four Most Common Evasive Techniques Used by Malware

April 30, 2015 Added by:Tripwire Inc

Malware might be growing in sophistication when it comes to anti-detection measures, but every day, the security community arrives at new measures that use these same evasion tactics against the malicious software they are designed to protect.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Social Engineering: Attackers' Reliable Weapon

April 29, 2015 Added by:Brian Prince

Whatever the ploy, social engineering is the opening salvo in targeted attacks against organizations all over the world.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Hackers Tricked AT&T, Network Solutions Employees in Tesla Attack

April 28, 2015 Added by:Eduard Kovacs

The official website and Twitter accounts of Tesla Motors were briefly hijacked over the weekend. The electric car manufacturer has provided some details on the attack.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

8 Security Practices to Use in Your Employee Training and Awareness Program

April 27, 2015 Added by:Tripwire Inc

This might be hard to believe, but it is true: 59 percent of data breaches are happening not because of some smart hacker who wants to do harm to your company but because of your own employees.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Tech Brief: An Inside View of a Zero-Day Campaign

April 22, 2015 Added by:Malwarebytes

Discovering a new vulnerability in a popular piece of software is the Holy Grail for cybercriminals. The period between this vulnerability being weaponized into an exploit and becoming public knowledge poses a huge security risk to consumers and businesses.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »