Blog

Blog

Obama to Appoint First Federal Chief Information Security Officer

The Obama administration has announced its intention to appoint the United States' first ever federal chief information security officer (CISO). On Tuesday, the President is expected to roll out a budget of $19 billion for federal information security spending. That budget, which marks a 35 percent increase over last year's allotment of $14 billion,...
Blog

The Change Management and Baselines Challenge in NERC CIP

In the last year, change management has been one of the top challenges customers want to solve. The problem is complex, and integration is essential to producing a sustainable solution. There are multiple drivers behind the challenge. First of all, there must a compliant change management process that produces supporting evidence. For high-impact...
Blog

Under the Hood of Cryptowall 4.0

Back in December, Heimdal Security spotted the Angler exploit kit leveraging drive-by campaigns to infect unsuspecting web users with Cryptowall 4.0 ransomware. The notorious malware has since been spotted in additional attack campaigns, leading Heimdal to wonder whether a newer version is on the horizon. Cryptowall's next installment will no doubt...
Blog

EMET 5.5 - Update Released for Microsoft's Best Kept Secret

It's one of Microsoft's best kept secrets. First released in 2009, the Enhanced Mitigation Experience Toolkit from Microsoft (EMET for short) has been helping companies reduce the risk of being exploited via unknown vulnerabilities in Windows and Windows applications. By detecting and preventing the buffer overflows and memory corruption...
Blog

How to Build a Remote Security Team

This will not come as a surprise to many of you, but there’s a current shortage of cyber security experts out in the field, which is causing job vacancies all over the country. Over the years, we’ve seen the demand for cyber security professionals spike dramatically as organizations realize there’s a problem, and are actively looking to recruit...
Blog

3 Fundamental Traits of an Infosec Aficionado

I’ve had a lot of conversations with high school students and students in their initial years of university who don’t particularly know what they want to be when they grow up. Heck, I’m still trying to figure that out! The advice you hear from most guidance councilors and others who mean well is generally to find something you like to do, something...
Blog

Slaying Rogue Access Points with Python and Cheap Hardware

Imagine we’re sitting at a Starbucks on a Friday afternoon. The coffee shop is pretty busy and full of aspiring hipsters sipping soy lattes and typing away at their MacBooks while loudly listening to Miles Davis. Suppose we really dislike Miles Davis for some reason, and we really want to turn that music off. We could connect to the open WiFi...
Blog

Ransomware Happy Ending: 10 Known Decryption Cases

Hit by ransomware and have no backup? Most of the time, regretfully, you have no chances to recover the encrypted data beyond paying the ransom to the extortionists. The crypto algorithms employed in these attacks cannot be cracked, and the private decryption key is kept on servers inaccessible to the victims. But let’s be positive. Quite a few...
Blog

BlackShades RAT Co-Creator Receives Five Years of Probation

An American man has received five years of probation for co-creating the BlackShades remote access trojan (RAT). On Friday, Michael Hogue, 25, of Arizona, who went by the name "xVisceral" online, received his sentence from U.S. District Judge Keven Castel in Manhattan after pleading guilty back in 2013 to distributing the malware and conspiring to...
Blog

Temporary and Disposable Email: Anonymity, Privacy or Security?

There are several websites available that offer temporary and disposable email addresses, which have become quite popular among Internet users today, as they provide a quick alternative to anyone who wishes for their email address to remain private when sending and receiving emails. Temporary and Disposable Email/SMS - What you Need to Know Some...
Blog

Are Financial Services IT Pros Overconfident in Data Breach Detection Skills?

Tripwire studied confidence vs. knowledge of financial services IT security pros on seven key security controls necessary to detect a data breach. For many controls IT pros believed they had the information necessary to detect a breach quickly but provided contradictory information about the specific data. ...
Blog

Activist Dumps Data of America's Largest Police Union

On Thursday, an activist posted online a data dump of private files belonging to the United States' largest police union. The Guardian reports that the Fraternal Order of Police (FOP), a union which represents 333,000 law American enforcement personnel, has contacted the Federal Bureau of Investigations and requested that it investigate how 2.5GB of...
Blog

4 Factors Behind the Rise of Exploit Kits as a Service

It has been a busy couple of months for the web's most notorious exploit kits (EKs). Back in September, researchers detected a ransomware attack that leveraged outdated content management systems (CMS) in order to redirect user traffic to malicious domains infected with the Neutrino exploit kit and Teslacrypt ransomware. Another ransomware attack...
Blog

Vulnerability Management Program Best Practices – Part 3

This is the conclusion to a three-part series of building a successful vulnerability management program. The first installment focused on Stage One, the vulnerability scanning progress. Without a foundation of people and process, the remaining stages are prone to failure. The second installment focused on Stage Two and Three, using a vulnerability...