Resources

Blog

Don’t Make Your Password a Classic

Think of a classic item in your life. Perhaps it is a song that defines your generation. Or maybe it is a life event that holds special meaning for you. We all have them. They are part of what makes life wonderful. Why do classics matter in a security blog? With the recent revelation that the LinkedIn breach was far worse than originally reported,...
Blog

May 2016: The Month in Ransomware 

In May, ransomware was in full bloom. Over sixteen new ransom Trojans surfaced, plus one Ransomware-as-a-Service (RaaS) and plenty of updates to existing ransomware. The good news is that at least six new decryptors were released. The database of ransom infections has been extended, with a novel specimen that targets websites rather than computers...
Blog

Checkmate – There Is No Rematch

When playing chess, you need to consider not only your next three to five moves but also the next several moves of your opponent. In our case, the security of an organization's data and infrastructure is open to an abundance of moves by hackers and malicious insiders. Regardless of which defensive pieces you have in place – knights, bishops, pawns...
Blog

FBI Warns of Surge in Email Extortion Schemes Tied to Recent Breaches

The FBI’s Internet Crime Complaint Center (IC3) has issued an alert, warning users of a spike in reported extortion email attempts connected to recent high-profile data breaches. According to the advisory, targeted individuals are told that their personal information—such as their name, phone number, address, credit card information, and other...
Blog

TeamViewer denies hack, as users claim computers remotely hijacked

In the last day or two, there have been a spate of posts by TeamViewer users claiming that their computers have been hijacked by malicious hackers, their PayPal and other banking accounts emptied, their webmail accessed, and malicious software installed. And the victims seem to believe the attacks are linked to their use of TeamViewer. ...
Blog

The 4 Commandments of Endpoint Detection and Response (EDR)

Now that you know how to plan for, select and deploy an endpoint detection and response (EDR) solution, there are just a few things you need to remember about EDR going forward. These are as follows: 1. Discovery and Inventory of Endpoints Are Key To effectively secure your organization's endpoints, you need to understand the contextual details of...
Blog

IT Security Tips for International Travel

When you travel internationally for business, you’re likely headed to a country that utilizes drastically different cybersecurity laws. In the U.S., you can expect a reasonable amount of privacy for your data and devices. Even with the uproar about the National Security Agency (NSA) and security violations in recent years, Americans still enjoy a...
Blog

Is the Vulnerability Warning Bubble About to Burst?

I was there when the bubble burst in ’99. If you are too young to know the reference to the bubble of 1999, or if you are so old that you have forgotten it, 1999 was the year that the "internet bubble" burst. What was it that caused this bursting effect? The internet wasn’t the problem. The internet is still here. The problem was driven by the...
Blog

All the World's a Chess Board, and All the Security Pros Merely Pieces

Information security is a lot like chess. On the macro level, the security field is divided between the black hats and the white hats, just as a chessboard is split between black and white pieces. Those groups compete against one another using a combination of offensive and defensive tactics. Ultimately, each "match" is different than the next. Some...
Blog

Man Busted in Darkode Takedown Receives Jail Time

A man who was busted in the takedown of the hacking forum Darkode has received jail time for his online criminal activities. U.S. District Judge Dee D. Drell sentenced Rory Stephen Guidry, 29, also known as "[email protected]," of Opelousas, Louisiana, to 12 months and one day in prison for using a computer to steal money, hack computers in an attempt to...
Blog

From Monkey to Man – The Evolution of a CISO

I think we are all familiar with the popular axiom, “It’s not IF you get compromised, it’s WHEN you get compromised.” I’m also pretty sure we all know that IT security is no longer viewed purely as an operational concern but as a significant contributor to business risk. As a result of this, IT security is quickly moving up the ladder on the...
Blog

Phishing Attacks Surged 250% in Q1 2016, Says New APWG Report

The Anti-Phishing Working Group (APWG) says it observed a record-breaking 250 percent surge in phishing attacks between October 2015 and March 2016. According to its latest report, the number of unique phishing websites detected in Q1 totaled 289,371, with more than 123,000 of those sites being discovered in March 2016 alone. APWG says the findings...
Blog

Hire a DDoS Attack for as Little as Five Dollars

Fancy a career as a blackmailing cybercriminal but don't have the technical nous? Don't worry, you can easily find people all too willing to help you embark on your life in cybercrime via popular freelance-hiring websites. And, it seems, you may only need to pay five dollars to get a hacker to launch a debilitating denial-of-service attack against...
Blog

Dropbox Addresses Security Concerns for New Initiative's Kernel Access

Dropbox has responded to security concerns regarding one of its new technology's abilities to obtain kernel access. Back in April, the secure file sharing and storage service announced "Project Infinite," an initiative which will help revolutionize the way Dropbox interfaces with a user's computer. Dropbox software engineer Damien Deville provides...
Blog

Google Announces Plans to Help Kill Off Passwords on Android Devices

Google has announced plans that will help kill off the need for passwords on Android mobile devices. During his Friday talk at Google I/O, an annual software developer conference, Daniel Kaufman of the tech giant's Advanced Technology and Projects (ATAP) division revealed the upcoming roll-out of Trust API. Instead of relying on passwords, Trust API...
Blog

Overlooking the Value of Your Pawns

Instead of imagining myself as a chess piece, I prefer to try and look at the chess board as a whole and see where the biggest perceived vulnerabilities or weakness lie. Most organisations could be seen as being modelled the same ‘in terms of staff ratio’ to a chess board. Usually, there is only 1 king (CEO), and then the rest of the chess pieces...