Resources

Blog

Evolving Connectivity: Understanding the Benefits and Risks of IoT

We at The State of Security have explored all the ways people can strengthen their security online in acknowledgement of National Cyber Security Awareness Month (NCSAM) 2016. We kicked off the public awareness campaign by providing tips on how users can protect their passwords, as well as defend against ransomware and other common IT security...
Blog

How to fight macro malware in Office 2016 and 2013

Macro malware arrived with a bang 21 years ago, and it's still causing problems. Concept, the first ever virus to spread by infecting Microsoft Office files, turned the anti-virus world on its head overnight when it was shipped by Microsoft on a CD ROM in August 1995. Up until then the main thing computer users had to worry about was malware hiding...
Blog

100,000 Bots Infected with Mirai Malware Behind Dyn DDoS Attack

Dyn has stated that approximately 100,000 bots infected with Mirai malware helped launch a large distributed denial-of-service (DDoS) attack against its domain name system (DNS) infrastructure. Scott Hilton, EVP of product at the internet performance management company, said in a statement on 26 October that the distributed denial-of-service (DDoS)...
Blog

The Health of Healthcare’s Cyber Security

The current diagnosis for healthcare cyber security is frightening. Here's our current assessment:One in three healthcare records were compromised in 2015 (IBM 2016).Healthcare is the number one industry when it comes to its records being breached (IBM 2016).Ransomware is on the rise, with 88 percent of attacks occurring in healthcare (Solutionary...
Blog

Tech Savviness Does Little for Americans' Security Aptitude, Finds Survey

There's no better time than autumn to raise user awareness about how to stay safe online. It's a time of year when children return to school and information security students take the next step towards launching their career. We also can't forget that October is National Cyber Security Awareness Month (NCSAM) in the United States and European Cyber...
Blog

The .Thor Variant of Locky Virus

The newest variant of Locky ransomware has begun to add yet another file extension to the files it encrypts, and it is the .thor file extension. The virus drops a _WHAT_is.html and the same named .bmp type of file after an infection has been caused. The ransomware also creates several other files, such as a malicious .dll file that causes the...
Blog

Protecting Your Privacy Doesn't Have to be Complicated

We’ve all been warned – no matter what we do online, somebody is out there watching. It might be to gather information for marketing purposes. The exposure of personal information to the wrong party, however, is a real concern. All of our emails, photos, passwords, addresses, credit card numbers, and social media messages are out there for someone...
Blog

New MAC OS and iOS Changes Might Frustrate VPN Users

It’s been weeks since Apple released its new operating systems, iOS 10 and mac OS Sierra. The new updates brought security patches, features and upgrades. Siri assistant has finally arrived on desktops, and an exciting universal clipboard allows you to select photos from an iPhone device and paste them directly on the desktop. However, with these...
Blog

The .Shit File Virus Ransomware Is No Joke

Well, this didn’t take long – after .Odin, and .Zepto before it, the latest successor to the Locky Ransomware line is here. It has been rather “playfully” named .Shit File Virus by its creators. Apart from the name, there’s nothing to laugh at concerning this newest Ransomware threat. A rather significant drop in malware activity in the last few weeks...
Blog

iOS, Android Apps Found Leaking User Privacy Data, Researchers Say

Security researchers are warning of a rise in mobile apps leaking user privacy data, including device metadata, location and personally identifiable information (PII). In a new report analyzing mobile privacy trends, researchers at Zscaler revealed both Android and iOS users could be left vulnerable to targeted denial-of-service attacks, phishing...
Blog

Women in Information Security: Tiberius Hefflin

Information security is the fastest growing area of IT. It affects more people in more ways than ever before. It affects not only our public records, our utilities, our white-collar work, and our entertainment. Now that we carry small computers in our pockets and in our cars, talk of the Internet of Things (IoT) is also starting to become reality....
Blog

DYN Restores Service after DDoS Attack Downed Twitter, Spotify, Others

UPDATED 21/10/2016 11:15 EDT DYN has restored service after a distributed denial-of-service (DDoS) attack against its DNS infrastructure took down Spotify, Twitter, and a host of other sites. The internet performance management company published a statement on its status page explaining that a DDoS attack was responsible for the service interruption...
Blog

The White House Meets WestWorld: The “Future of Artificial Intelligence” in the United States

Perhaps completely in sync with the tremendous press surrounding the new HBO hit series WestWorld, the Obama White House issued a press release on October 11, 2016, entitled "The Future of Artificial Intelligence" along with a lengthy report “National Artificial Intelligence ('A.I') Research and Development Strategic Plan” (PDF, hereinafter the ...
Blog

Building For The Cloud at Home

This post will touch briefly on the "why" of reproducible builds, but it is primarily a quick and dirty "how to" when building for Amazon Web Services. If you're not familiar with the concept, reproducible builds (sometimes referred to as "verifiable builds”) are a methodology of building software in such a way that the path from the source code to...
Blog

4 Reasons to Get Your Master’s Degree in Cyber Security

There is a severe talent shortage in the cyber security field. In fact, it’s one of the few fields with a negative unemployment rate, and analysts are estimating that there will be 1.5 million cyber security job openings by 2019. So, if you have been considering entering the field or advancing your career within the industry, this is an opportune...