Impersonation

Bd07d58f0d31d48d3764821d109bf165

5 Social Engineering Attacks to Watch Out For

March 25, 2015 Added by:Tripwire Inc

Hackers who engage in social engineering attacks prey off of human psychology and curiosity in order to compromise their targets’ information. With this human-centric focus in mind, it is up to users and employees to counter these types of attacks.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Dangers Accelerate: Increasing Global Threats Loom Over Information Security Landscape

March 19, 2015 Added by:Steve Durbin

The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of today’s most trusted organizations. Attackers have become more organized, attacks are more refined, and all threats are more dangerous, and pose more risks, to an organization’s reputation than ever before.

Comments  (3)

C940e50f90b9e73f42045c05d49c6e17

New Facebook Worm Variant Leverages Multiple Cloud Services

March 12, 2015 Added by:Malwarebytes

Social networks are particularly interesting for malware authors because they can be leveraged to spread an infection starting with a single person.

Comments  (5)

0ead717779244d9aab5c1699308850d2

Financial Malware Fell in 2014 As Takedown Operations Have Impact

March 05, 2015 Added by:Brian Prince

One takedown at a time, security researchers and law enforcement were able to make a dent in financial cyber-crime last year.

Comments  (15)

1c7e19555c747737c9064d29ea238f27

DARPA’S Memex Project Shines Light on the Dark Web

March 03, 2015 Added by:Robert Vamosi

To better combat the increasing use of the Dark Web for illegal purposes, DARPA, the U.S. military’s Defense Advanced Research Projects Agency, is building a search engine known as Memex for law enforcement use.

Comments  (2)

Fb8b25d02a3d508548a993c59946c1e6

SIGINT and Cyber Intelligence

February 19, 2015 Added by:Scott Fitzpatrick

It’s fascinating to watch the political climate being held sway with what are identified as “cyber terrorism” and “cyber war.” But it’s not the first time the Department of Defense has had to come to grips with a polemic decision that would require reengineering their entire fiscal architecture.

Comments  (5)

B8db824b8b275afb1f4160f03cd3f733

We Need to Talk About Attribution

February 11, 2015 Added by:Jack Daniel

One of the InfoSec community’s greatest distractions lately has been attribution, both specifically and generically.

Comments  (5)

F45df53d99605d46f5ae32b7bed9fe22

Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (5)

E595c1d49bf4a26f8e14ce59812af80e

White House Turns Attention to Cybersecurity

February 05, 2015 Added by:Patrick Oliver Graf

Cyberattackers and hackers operate in the shadows, lurking away from where conventional law enforcement can easily identify and investigate them. They prefer secrecy and anonymity.

Comments  (5)

A70a600d7c593ca50cc6639cd64ed71a

Attackers, Distraction, Deception and Misdirection

February 03, 2015 Added by:Joseph Pizzo

When it comes to security, be it data in motion, data in execution or data at rest, the bad guys often lurk in plain sight. They have the time and patience to wait for a distraction that allows their malicious activity to go by unseen.

Comments  (3)

E595c1d49bf4a26f8e14ce59812af80e

Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password

January 29, 2015 Added by:Patrick Oliver Graf

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?

Comments  (7)

E595c1d49bf4a26f8e14ce59812af80e

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

January 22, 2015 Added by:Patrick Oliver Graf

Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?

Comments  (4)

C940e50f90b9e73f42045c05d49c6e17

New Adobe Flash Zero-Day found in the Wild

January 22, 2015 Added by:Malwarebytes

Security researcher Kafeine has discovered a Zero-Day in Adobe Flash Player distributed through the Angler Exploit Kit.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Cyber-Civic Responsibility

January 21, 2015 Added by:Brent Huston

The only thing that really has a chance of working is if we all start taking responsibility for our own share of the problem.

Comments  (5)

Bd07d58f0d31d48d3764821d109bf165

Buying Illegal Goods on the Digital Underground

January 19, 2015 Added by:Tripwire Inc

The fact that Silk Road has returned is a testament to users’ ongoing ability to purchase illegal goods online, not to mention merchants’ ability to sell these products.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Social Engineering: How Dangerous is Your Lunch Break?

January 15, 2015 Added by:Tripwire Inc

If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »