Resources

Blog

The Number One Reason Enterprises Fail to Attain Cyber Resilience

In my last blog post, I discussed the five levels of preparedness for cybercrime and remarked on the sad fact that the majority of enterprises are at the reactive or compliant levels. I also discussed that reacting to cybercrime is driven by attempting to deliver security, which is predominantly built upon an over-reliance on prevention capabilities...
Blog

Linux Security – The Next Big Target for Cyber Criminals

As the cyber security threats continue to evolve and expand upon both consumers and companies, we observe a shift from the traditional Trojans and Worms to more complex malware that can truly devastate a system. The contemporary viruses execute their payloads in stages and can dynamically affect different parts of the target system. The biggest...
Blog

Europol Warns of the Top 8 Cybercrime Trends in 2016

A new report released by Europol's European Cybercrime Center (EC3) warns of the eight main cybercrime trends that investigators have seen impact a growing number of citizens and businesses this year. The 2016 Internet Organised Crime Threat Assessment (IOCTA) found that the volume, scope and...
Blog

Why Is Endpoint Protection a Big Deal in ICS Environments?

In a previous blog post, ICS: Next Frontier For Cyber Attacks blog, I spoke about the cybersecurity posture of industrial control systems (ICS) and the enormous implications for such attacks. For industrial organizations, it means downtime and lost business. For individuals, it means potential safety issues and lost services. For society, it means...
Blog

Odin File Virus Ransomware Is Here!

Do you remember the .Zepto Ransomware? Of course, you do. Well, you can more or less put it in the rear-view mirror. However, there is very little in the way of actual reasons for celebration. A new threat is on the rise! It’s been tentatively called .Odin File Virus. It changes your files’ extensions to match the name of the one-eyed god from the...
Blog

Project Springfield Fuzzing Tool Set to Help Customers Find Security Bugs

Microsoft has announced the release of Project Springfield, a fuzzing tool which helps customers find security bugs in software before the hackers do. According to the Redmond-based company, the service is designed to help developers find security vulnerabilities proactively. As a result, they don't need to undertake the costly effort of releasing a...
Blog

The Right Way to Respond to a Data Breach

Cybersecurity has become a board level discussion, and worries about cybersecurity breaches are part of what keeps C-suite execs and BOD members up at night. So much so that many organizations have started to adopt the mentality that they’ve likely been breached already and they just don’t know it yet. It’s what’s known as the “assume breach”...
Blog

Hackers Can't Break This Style of Coding, Confirm Researchers

On April 7, 2014, the world first learned about the Heartbleed vulnerability. A small flaw in OpenSSL's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520), Heartbleed enables an attacker to unravel the encryption measures in systems protected by vulnerable OpenSSL software, which some at the time...
Blog

Yahoo Says 500M Users' Account Info Stolen by State-Sponsored Actor

Yahoo says a state-sponsored actor stole the account information for at least 500 million of its users in a breach that occurred back in late-2014. On 22 September, Yahoo CISO Bob Lord confirmed that the hack might have compromised several pieces of its users' account information: "We have confirmed that a copy of certain user account information...
Blog

Digital Attacks Against Smart Cities Could Threaten Public Safety, Reveals Survey

Technology analysts are divided on the notion of a "smart" city. On the one hand, proponents note that by creating "smart" systems to run public transportation, waste removal, traffic control, and the water system, cities can improve the efficiency of their municipal services. Such enhanced productivity would help urban centers better accommodate...
Blog

Dropbox Leverages Defense in Depth to Store Its Users' Passwords

Dropbox relies on a defense in depth strategy consisting of multiple layers of hashing and encryption to protect its users' passwords. Devdatta Akhawe, a security engineer at the file storage service, says Dropbox went to all this trouble to prevent attackers not only from directly compromising members' plaintext passwords but also from accessing...
Blog

Bank cyber heists are here to stay, says SWIFT security chief

Money makes the world go around, and SWIFT - the worldwide inter-bank communication network - is the system that allows banks to send money to each other. So when online criminals find a way to exploit SWIFT, they can transfer huge amounts of money to bank accounts under their control. As we have...
Blog

Credit Card Fraud: 10 Tips on How to Protect Against It

Many people don’t understand how fraudulent charges range from as little as $7.19 from some odd electronics store to $655.38 at some store in Russia while you reside in North America. We tend to think that this may have happened because we used our cards to pay for parking at random locations or for public transportation. As it is easier and quicker...
Blog

Tampered, Not Breached

James Bond always orders his martini prepared a special way: “Shaken, not stirred.” Being a teetotaler, I have always wondered what would happen if Bond – James Bond – was served a stirred martini. Would he be able to tell? Many of the more notable drink masters in the infosec community could probably educate me about the subtle differences between...
Blog

Education Sector Most Targeted by Ransomware Attacks, Report Says

According to new data, the education sector now ranks as the most-targeted industry by ransomware attacks. In a recent report, security firm BitSight analyzed the growing ransomware threat across nearly 20,000 companies over the last 12 months. Researchers found that organizations in education had the highest rate of ransomware – with at least one...
Blog

Mail's Here! And With It a Malware-Laden USB Stick, Warns Aussie Police

Australian police is advising people to be on the lookout for unmarked, malware-laden USB sticks that someone is dropping into their mailboxes. On 21 September, the Victoria Police published a statement revealing that residents of the suburb of Pakenham in Victoria's capital Melbourne are discovering unmarked USB drives in their mailboxes. Here's a...
Blog

Five Tell-Tale Signs of a Compromised Website

Everyone has done it at least once – entered the wrong URL when trying to visit a website. Maybe instead of "google.com" you fat-fingered "google.cm," Google's main search page for Cameroon. No big deal there, and we hear the scenery there is lovely. But sometimes a tiny mistake can result in big problems. Entering a URL that’s off by just one...