Resources

Blog

Fraudsters Use Angler Phishing on Twitter to Lure PayPal Customers

Fraudsters are leveraging an emerging social engineering technique called "angler phishing" to fool victims into handing over their PayPal credentials. Researchers at security firm Proofpoint, who discovered this particular campaign, elaborate on what sets angler phishing apart from ordinary phishing attacks: "The attack technique takes its name...
Blog

How AI Can Save Corporate America from Devastating Cyber Attacks

It certainly has been another long week in cybersecurity. First, news that a third party hacked a group allegedly connected to the NSA and made off with secret “hacking tools” rocked the industry. It was shortly followed by news of cyber attacks in the form of smart email “bombs” raining down upon the mailboxes of .gov employees in a way very...
Blog

Dropbox Says Data Dump of 60M User IDs the Real Deal

American file hosting service Dropbox said a data dump of approximately 60 million users' records is real. A spokesperson for the company said the records, which include email addresses as well as hashed and salted passwords, are the same as those affected by a security incident that occurred several...
Blog

Combating the Major Risks Your Business Could be Facing

Organizations face all sorts of risks that threaten to derail their progress and inhibit future growth. The headlines likely don’t provide much comfort as you read about another major company becoming a victim of a massive security breach. There’s a lot to worry about out there, and the tiniest mistake can quickly be exploited, putting your business...
Blog

Back-to-School Tips on How Your Children Can Stay Safe Online

There's no hiding it. The days are getting cooler. The sun's setting earlier. And the leaves are beginning to change. Summer's gone as quickly as it came, which means one thing and one thing only: it's back-to-school season. Soon, kids around the world will be starting up a new year of classes. That means they'll be chatting on line, looking for...
Blog

Website Down? New FairWare Ransomware Could Be Responsible

Linux users are reporting a new ransomware called "FairWare" played a part in taking down their websites. News of the ransomware first surfaced in a post on Bleeping Computer's forums. According to the victim, attackers likely brute-forced or intercepted the password for their Linux machine. Once they acquired access, the baddies logged into the Linux...
Blog

Collaboration Is Key to Information Security

The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to. When it seems that...
Blog

The Root Causes of a Poor Security Culture within the Workplace

Demonstrating to employees that security is there to make their life easier, not harder, is the first step in developing a sound security culture. But before we discuss the actual steps to improve it, let’s first understand the root causes of a poor security culture. Security professionals must understand that bad habits and behaviours tend to be...
Blog

Advanced Malware Detection and Response Begins at the Endpoint

It's no secret the security community is witnessing a boom in sophisticated techniques and attack campaigns. Some of the most advanced threats circulating in the wild today leverage polymorphic malware that changes its form based upon the environment in which it activates. As a result, signature-based detection solutions have a difficult time...
Blog

Startup Website Security And WordPress Vulnerability

You, a creative entrepreneur with a great idea, finally launch a business. As a startup, having your own website is essential in conducting business. Startups must always take extra precaution when it comes to their web security. Because startups are the perfect targets for hackers, your website should be protected as soon as it is ready to go live....
Blog

The DEF CON 24 Experience

This year, I was fortunate enough to attend the DEF CON 24 security conference, one of The State of Security's top 11 infosec conferences, which took place August 4-7, 2016, at Paris and Bally's in Las Vegas. Here's a summary of my experience. Cyber Grand Challenge An interesting addition to the unofficial first day of DEF CON this year was the...
Blog

How We Can Identify Promising Candidates for Open IT Security Positions

No one today is immune to the cybersecurity talent shortage. Whether you’re a company or individual, you feel the pain of a shortage of good IT security staff members. Companies feel the pain of trying to maintain an adequate staff, who need to be educated enough to maintain the company's environment and to avoid the risk of breaches and regulatory...
Blog

Epic Games' Forums Hacked...for the Second Time in a Year

American video game development company Epic Games has announced someone hacked its forums, making it twice in one year. On 22 August, the Cary-based organization disclosed the breach on its website: "We believe a recent Unreal Engine and Unreal Tournament forum compromise revealed email addresses and other data entered into the forums, but no...
Blog

Bringing Greater Information Security to the Automobile Industry

We are moving into an era of inter-connectivity with billions of devices, including a previously disconnected industry of automotive vehicles. Vehicles were not designed with computer security in mind, and that worked just fine for the last few decades. However, now we are at a point where we can take an "unhackable" 1997 Honda Civic and add in a...
Blog

Log Management: Understanding What Happened in a Security Event

Security configuration management (SCM) is central to an endpoint detection and response (EDR) strategy. It allows organizations to keep track of changes to their network devices, including those implemented by an unauthorized actor. As I discuss in another blog post, one of the most important features of an SCM program is the creation of a "secure...
Blog

Teen Walks Free After Launching DDoS Attack Against Australian Bank

A teenager received no prison time after launching a distributed denial-of-service (DDoS) attack against an Australian bank, among other targets. The 15-year-old boy, who by state law cannot have his name identified, admitted in court he had some fun and satisfied his curiosity when he DDoSed the online banking portal for the Commonwealth Bank of...
Blog

How to Torrent Safely and Legally

Torrenting is usually associated with copyright infringement. Online pirates use torrents to illegally download movies, video games, music, software, and much more. Even before Netflix banned the use of VPNs to watch movies and TV shows, many resorted to torrents to pirate video. But as authorities crack down on torrent trackers and users, demand...
Blog

‘Wicked’ Problems in Information Security

Incorporating security activities into the natural workflow of productive tasks makes it easier for people to adopt new technologies and ways of working, but it’s not necessarily enough to guarantee that you’ll be able to solve a particular security-usability issue. The reason for this is that such problems can be categorised as wicked. Rittel and...