Resources

Blog

Website Down? New FairWare Ransomware Could Be Responsible

Linux users are reporting a new ransomware called "FairWare" played a part in taking down their websites. News of the ransomware first surfaced in a post on Bleeping Computer's forums. According to the victim, attackers likely brute-forced or intercepted the password for their Linux machine. Once they acquired access, the baddies logged into the...
Blog

Collaboration Is Key to Information Security

The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to. When it seems that...
Blog

The Root Causes of a Poor Security Culture within the Workplace

Demonstrating to employees that security is there to make their life easier, not harder, is the first step in developing a sound security culture. But before we discuss the actual steps to improve it, let’s first understand the root causes of a poor security culture. Security professionals must understand that bad habits and behaviours tend to be...
Blog

Advanced Malware Detection and Response Begins at the Endpoint

It's no secret the security community is witnessing a boom in sophisticated techniques and attack campaigns. Some of the most advanced threats circulating in the wild today leverage polymorphic malware that changes its form based upon the environment in which it activates. As a result, signature-based detection solutions have a difficult time...
Blog

Startup Website Security And WordPress Vulnerability

You, a creative entrepreneur with a great idea, finally launch a business. As a startup, having your own website is essential in conducting business. Startups must always take extra precaution when it comes to their web security. Because startups are the perfect targets for hackers, your website should be protected as soon as it is ready to go live....
Blog

The DEF CON 24 Experience

This year, I was fortunate enough to attend the DEF CON 24 security conference, one of The State of Security's top 11 infosec conferences, which took place August 4-7, 2016, at Paris and Bally's in Las Vegas. Here's a summary of my experience. Cyber Grand Challenge An interesting addition to the unofficial first day of DEF CON this year was the...
Blog

How We Can Identify Promising Candidates for Open IT Security Positions

No one today is immune to the cybersecurity talent shortage. Whether you’re a company or individual, you feel the pain of a shortage of good IT security staff members. Companies feel the pain of trying to maintain an adequate staff, who need to be educated enough to maintain the company's environment and to avoid the risk of breaches and regulatory...
Blog

Epic Games' Forums Hacked...for the Second Time in a Year

American video game development company Epic Games has announced someone hacked its forums, making it twice in one year. On 22 August, the Cary-based organization disclosed the breach on its website: "We believe a recent Unreal Engine and Unreal Tournament forum compromise revealed email addresses and other data entered into the forums, but no...
Blog

Bringing Greater Information Security to the Automobile Industry

We are moving into an era of inter-connectivity with billions of devices, including a previously disconnected industry of automotive vehicles. Vehicles were not designed with computer security in mind, and that worked just fine for the last few decades. However, now we are at a point where we can take an "unhackable" 1997 Honda Civic and add in a...
Blog

Log Management: Understanding What Happened in a Security Event

Security configuration management (SCM) is central to an endpoint detection and response (EDR) strategy. It allows organizations to keep track of changes to their network devices, including those implemented by an unauthorized actor. As I discuss in another blog post, one of the most important features of an SCM program is the creation of a "secure...
Blog

Teen Walks Free After Launching DDoS Attack Against Australian Bank

A teenager received no prison time after launching a distributed denial-of-service (DDoS) attack against an Australian bank, among other targets. The 15-year-old boy, who by state law cannot have his name identified, admitted in court he had some fun and satisfied his curiosity when he DDoSed the online banking portal for the Commonwealth Bank of...
Blog

How to Torrent Safely and Legally

Torrenting is usually associated with copyright infringement. Online pirates use torrents to illegally download movies, video games, music, software, and much more. Even before Netflix banned the use of VPNs to watch movies and TV shows, many resorted to torrents to pirate video. But as authorities crack down on torrent trackers and users, demand...
Blog

‘Wicked’ Problems in Information Security

Incorporating security activities into the natural workflow of productive tasks makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee that you’ll be able to solve a particular security-usability issue. The reason for this is that such problems can be categorised as wicked. Rittel and...
Blog

Another Data Breach Notice, This Time from Eddie Bauer

Eddie Bauer LLC, which manages the Eddie Bauer clothing line, is just the latest company to issue a notice warning customers of a data breach. On 5 July, 2016, infosec journalist Brian Krebs reached out to Eddie Bauer. Sources had told him about a pattern of fraud with customers who had used their...
Blog

Cisco Confirms Two Exploits Found in Shadow Brokers' Data Dump

Cisco has confirmed the legitimacy of two exploits found in a data dump of code released by the Shadow Brokers hacker group. On 13 August, the mysterious hacking group announced an auction of files allegedly containing exploit code used by the Equation Group, a sophisticated threat actor which leverages unknown vulnerabilities in multiple vendor...
Blog

The Evolution of Hacking

Nowadays, the word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves intent on stealing identities and letting disruptive viruses loose into cyberspace. It wasn’t always that way. In fact, computer hackers were originally viewed by society as technology enthusiasts who wanted nothing more than to...