Resources

Blog

Attackers Leveraged Large CCTV Botnet to Launch DDoS Attacks

Attackers leveraged a botnet consisting of thousands of closed-circuit television (CCTV) devices to launch distributed denial-of-service (DDoS) attacks. Daniel Cid, CTO of Sucuri Security, explains that a small jewelry shop recently signed up with his company. At the time, the new customer was experiencing a DDoS attack that had knocked it offline...
Blog

3 Ideas to Help Create Phishing Awareness

I'm pleased to say someone very close to me was recently nabbed by a phish. The phish came into her email looking important and innocuous, so she opened it (and the attachment) and was immediately presented with a message that read, "Your corporate IT security team is conducting phishing training. You just opened what could have been a malicious...
Blog

U.S. Charges Filipino Man For Hacking Celebrities’ Bank Accounts

A Filipino man has been charged with running a large-scale identity theft scheme targeting numerous celebrities and other high-profile victims, reported Reuters. Last week, federal prosecutors in the District of New Jersey, charged Peter Locsin, 35, of Talisay City, Philippines, with one count of bank fraud conspiracy and two counts of aggravated...
Blog

Hacker Selling 650K Healthcare Records on the Dark Web

A hacker who goes by the name "TheDarkOverlord" is selling more than 650,000 patients' healthcare records on the dark web. Motherboard reports that TheDarkOverlord obtained access to three separate databases containing the records by first exploiting an unknown vulnerability in how certain companies implement remote desktop protocol (RDP), which...
Blog

5 Ways to Add Value to Your Business through User Experience (UX)

Security products are not simple e-commerce websites. They are enterprise software products that enable pivotal business goals for customers. Yet as complexity grows, ease of use and other aspects of user experience (UX) can be overlooked and de-prioritized to make way for more features. But as Haroon Meer of Thinkst was quoted in CSO Online: "It...
Blog

Carbonite Resets Users' Passwords After Password Reuse Attacks

Online backup service Carbonite is requiring all users to change their passwords after it observed password reuse attacks targeting their accounts. On Tuesday, the company announced the password reset in a statement posted to its website: "As part of our ongoing security monitoring, we recently became aware of unauthorized attempts to access a...
Blog

My Time at Cisco Live 2015

Looking back now, it’s all a bit of a blur but what a wild ride it’s been! https://twitter.com/5683Monkey/status/608293161455206400 It was early spring 2015. I was fully immersed in the Cisco Networking Academy program at Red River College. As I spent my days deep in technology running my own small MSP, the future possibilities seemed endless as...
Blog

Industrial Control Systems (ICS): Next Frontier for Cyber Attacks?

It’s safe to say that cybersecurity is a common issue for all industries. But what is the cybersecurity state of affairs for Industrial Control Systems (ICS), and why should we care? ICS monitor and control industrial and physical infrastructure processes that are crucial for industries like manufacturing, transportation, energy, oil and gas, and...
Blog

Intrigued by a Career in Infosec? Ask an Expert

On a day-to-day basis, we hear about new digital security threats that are growing in frequency and in sophistication. Responding to this ever-increasing number of challenges makes a career in information security challenging. But it's not all bad. Infosec is also profoundly rewarding to the extent that security personnel help protect businesses',...
Blog

RAA Ransomware Written Entirely in JScript

Researchers have spotted a new crypto-ransomware called "RAA" that is written entirely in the JScript scripting language. Originally detected by security researchers Benkow and JamesWT, RAA is distributed to users as an attached JS file. When a user clicks on the attachment, the file displays what appears to be a corrupted Word document, which allows...
Blog

The Trouble with Web Conferences

We sold our house and moved to an apartment in January, waiting for our new home to get built. Cleaning up the house for a move is a big chore, and one of my tasks for a weekend before the sale was cleaning up a big pile of post-it notes left in a box. I chanced upon a post-it note with a 1-888 number that was an AT&T teleconferencing line. I had...
Blog

Securing Applications During Development: The Ins and Outs of Open Source Static Code Analysis Tools

Just as having a larger family inevitably results in more children forgotten at swim practice, the bigger your software project, the harder it becomes to find every bug, security vulnerability and logic flaw. In-house enterprise developer teams can become overwhelmed by the number of branches in a project and bugs can go unnoticed until the worst...
Blog

"Spam King" Receives Jail Time for Spamming Facebook Users

Just as every king ascends the throne, so too must they in time forfeit their rule. That fateful day came on Monday for Sanford "Spam King" Wallace, 47, of Las Vegas, who was sentenced to two and a half years in prison as a result of his spamming activities against Facebook users. According to a statement published by the U.S. Attorney's Office in...
Blog

Business Email Compromise Scams Have Cost Victims $3B, Reports FBI

Companies have handed over more than three billion dollars to fraudsters as a result of business email compromise (BEC) scams, reports the FBI. In a public service announcement published on Tuesday, the FBI warns companies of a growth of BEC scams, sophisticated ploys where fraudsters attempt to use social engineering techniques such as phishing or...
Blog

Man Charged with Economic Espionage for Stealing Source Code

Our story begins when Xu Jiaqiang, 29, decided to resign from his employer. Xu began working as a developer for a United States company in November 2010. During that time, he enjoyed access to the company's proprietary software, a clustered file system which enhanced computer performance by coordinating tasks across multiple servers. The developer...
Blog

So, Just Why Is 18atcskd2w Such a Popular Password?

Users of popular online forums are being advised to change their passwords following the leak of some 45 million credentials. As LeakedSource reports, millions of user credentials from over 1,100 websites and communities - including techsupportforum.com, autoguide.com, petsguide.com and motorcycle.com - have been exposed after parent company...
Blog

411 Million Photos Available to FBI via Facial Recognition System

The FBI can draw on upwards of 411 million photos as part of a facial recognition system to identify potential criminal suspects. The Government Accountability Office (GAO) explains in a report (PDF) that a facial recognition service, which is known as the Next Generation Identification-Interstate Photo System (NGI-IPS), became fully operational in...