Resources

Blog

Protecting Your Privacy Doesn't Have to be Complicated

We’ve all been warned – no matter what we do online, somebody is out there watching. It might be to gather information for marketing purposes. The exposure of personal information to the wrong party, however, is a real concern. All of our emails, photos, passwords, addresses, credit card numbers, and social media messages are out there for someone...
Blog

New MAC OS and iOS Changes Might Frustrate VPN Users

It’s been weeks since Apple released its new operating systems, iOS 10 and mac OS Sierra. The new updates brought security patches, features and upgrades. Siri assistant has finally arrived on desktops, and an exciting universal clipboard allows you to select photos from an iPhone device and paste them directly on the desktop. However, with these...
Blog

The .Shit File Virus Ransomware Is No Joke

Well, this didn’t take long – after .Odin, and .Zepto before it, the latest successor to the Locky Ransomware line is here. It has been rather “playfully” named .Shit File Virus by its creators. Apart from the name, there’s nothing to laugh at concerning this newest Ransomware threat. A rather significant drop in malware activity in the last few...
Blog

iOS, Android Apps Found Leaking User Privacy Data, Researchers Say

Security researchers are warning of a rise in mobile apps leaking user privacy data, including device metadata, location and personally identifiable information (PII). In a new report analyzing mobile privacy trends, researchers at Zscaler revealed both Android and iOS users could be left vulnerable to targeted denial-of-service attacks, phishing...
Blog

Women in Information Security: Tiberius Hefflin

Information security is the fastest growing area of IT. It affects more people in more ways than ever before. It affects not only our public records, our utilities, our white-collar work, and our entertainment. Now that we carry small computers in our pockets and in our cars, talk of the Internet of Things (IoT) is also starting to become reality....
Blog

DYN Restores Service after DDoS Attack Downed Twitter, Spotify, Others

UPDATED 21/10/2016 11:15 EDT DYN has restored service after a distributed denial-of-service (DDoS) attack against its DNS infrastructure took down Spotify, Twitter, and a host of other sites. The internet performance management company published a statement on its status page explaining that a DDoS attack was responsible for the service interruption...
Blog

The White House Meets WestWorld: The “Future of Artificial Intelligence” in the United States

Perhaps completely in sync with the tremendous press surrounding the new HBO hit series WestWorld, the Obama White House issued a press release on October 11, 2016, entitled "The Future of Artificial Intelligence" along with a lengthy report “National Artificial Intelligence ('A.I') Research and Development Strategic Plan” (PDF, hereinafter the ...
Blog

Building For The Cloud at Home

This post will touch briefly on the "why" of reproducible builds, but it is primarily a quick and dirty "how to" when building for Amazon Web Services. If you're not familiar with the concept, reproducible builds (sometimes referred to as "verifiable builds”) are a methodology of building software in such a way that the path from the source code to...
Blog

4 Reasons to Get Your Master’s Degree in Cyber Security

There is a severe talent shortage in the cyber security field. In fact, it’s one of the few fields with a negative unemployment rate, and analysts are estimating that there will be 1.5 million cyber security job openings by 2019. So, if you have been considering entering the field or advancing your career within the industry, this is an opportune...
Blog

Macro Malware Employs Password Protection to Evade Analysis

A type of macro malware campaign has incorporated password protection into its attack emails in order to serve up ransomware. The campaign begins with an email that comes with an attached document bearing the .dot extension. It's password-protected, and the only way a recipient can open it is to enter in the password provided by the sender in the...
Blog

Takeaways from the 2017 PwC Global State of Information Security Survey

Organizations around the world are taking a more innovative approach to managing threats in today’s digital era, reveals the 19th annual Global State of Information Security Survey (GSISS). This year’s study – produced by PwC in conjunction with CIO and CSO – includes the responses of more than 10,000 business and IT security executives from over...
Blog

Hackers Stole Data and Personal Information from Nuclear Research Center

Hackers stole nuclear research data and personal information off of a computer at the University of Toyama’s Hydrogen Isotope Research Center. According to university officials, the hackers posed as a Tokyo university student to deliver a malware-laden document to a teaching member at the center, which conducts research on hydrogen, deuterium, and...
Blog

VERT Goes to Japan

Last week, I had the opportunity to travel to Tokyo, Japan to visit the Tripwire Japan office. I also had time to tour the city a bit with my colleague Lane Thames and his wife Linda. While the flights were long, the experience was absolutely worth it. The subway system, while pretty crazy to look at via map, was easy to navigate with the help of...
Blog

Ghost Push malware continues to haunt Android users

Android users are being reminded to only install apps from the official Google Play store or trusted third parties, after new research has revealed an alarming number of devices continue to be infected by a notorious family of malware. Security researchers at Cheetah Mobile Security claim that it is responsible for most of the Android infections...
Blog

Red Team v. Blue Team? They Are In Fact One – The Purple Team

Some people hate the red team. They think of them as the adversary, and at the extreme, people worry that their jobs are on the line. If any holes are found, network defenders worry it could be a mark on their competency. However, this should not be the case. Although it does not come across this way initially, the red team is leveraged to help the...
Blog

Computer Crime Never Pays, and These 5 Stories Prove It

It's no secret that some computer crime can generate a lot of money. For example, the author of Cerber ransomware relies on an affiliate system to distribute their creation. The malware developer collects only a fraction of the ransom payments, the average value of which usually amounts to around one Bitcoin. But even with just 0.3 percent of...