Blog

Blog

5 Things You Should Know about Gift Card Fraud

In 2016, the U.S. gift card industry was worth $127 billion. That figure is expected to reach $160 billion by 2018. It's little wonder why. Everyone loves them! From the retailer's point of view, customers who shop using a gift card oftentimes spend more than the initial value of the card. As for the customers themselves, gift cards allow them to...
Blog

Managing Cyber Risk in Schools and Educational Institutions

With analyst group Gartner valuing the annual global spending on educational technology at over £17 billion ($21 billion USD) in 2015, there's no doubt that technology implementation is shaping the future of education systems. The appropriate integration of technology guides students, teachers, and administrators towards clarity and extensibility....
Blog

How Secure Are You with Your Smartphones?

Take a moment to think about apps used daily on your smartphone. Facebook? Twitter? Email? Web browser? No one wants to be stalked or let anyone see their personal information from their smartphones. Think about leaving your phone unlocked while you're at home or unattended on your desk while going for meeting at work. What if someone looks at your...
Blog

LinkedIn Scam Wants Job Seekers to Hand Over Their CVs

Fraudsters have designed a new LinkedIn scam that uses phishing emails and a fake website to trick job seekers into handing over their CVs. The scam begins when a user receives a phishing email disguised as a LinkedIn email. In their message, the fraudsters inform the recipient that a company is "urgently seeking for immediate employment" in their...
Blog

Graduating in Information Security: Part Two

In part one of this series, I posited that additional integrity on a resume, as well as in interview situations, can benefit the entire information security profession by highlighting the specific disciplines in our industry. This, in turn, could serve to stop the perception of a cyber skills-gap by driving awareness that the InfoSec field is...
Blog

Microsoft Says "So Long" to Windows Vista

Microsoft has announced the end of Windows Vista support and is urging customers who still use the operating system to upgrade as soon as possible. The Redmond-based technology giant finalized Windows Vista's end of term in a blog post on 11 April: "Windows Vista customers are no longer receiving new security updates, non-security hotfixes, free or...
Blog

VERT Threat Alert: April 2017 Patch Tuesday Analysis

Today’s VERT Alert addresses the Microsoft April 2017 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-720 on Wednesday, April 12th. With the elimination of Security Bulletins, the VERT Alert will be changing. This shortened version will act as a placeholder until the launch of the improved...
Blog

Foundational Controls for Common Attack Types

In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attack types and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the research that I have to share for the purposes of this post. First, the top five attack types...
Blog

Insider Threats as the Main Security Threat in 2017

Alphabet, Google's parent company, recently filed a lawsuit against its former engineer Anthony Levandowski, who is now working with Uber. The company accused Levandowski of copying more than 14,000 internal files and taking them directly to his new employer. While this case is far from over, it brings about a very interesting and important...
Blog

Web Scraping for Fun (and Profit)…

There are many websites on the internet that are known to receive regular traffic from hackers, including a number of public forums, which are often used to release their stolen information. Hackers may release some of this information to take credit for a breach, attract buyers for the rest of the stolen information, or increase the damages to the...
Blog

Encryption Works Great, But Only When Done Right

In an article we wrote for Tripwire, we discuss the advantages of encryption and tokenization. The premise of our argument is as follows: slow down your adversary by making your data meaningless to them. In other words, make yourself a “goes nowhere” project forcing your adversary to seek out a target that does not cause them the grief you do....
Blog

Make Yourself a "Goes Nowhere" Project for Adversaries

Before we jump in, we need to make clear the following: no single solution will ever offer complete and total security. In fact, even multiple solutions designed to provide overlapping layers of security to your crown jewels will not provide “complete and total” security. But what any reasonably implemented solution should do is the following: slow...
Blog

Cyber-Attack Activates Over 150 Emergency Sirens Across Dallas

A cyber-attack reportedly set off all 156 emergency sirens across the city of Dallas, Texas, late Friday night. According to reports, the sirens were activated more than a dozen times between approximately 11:45 p.m. and 1:20 a.m. on Saturday until engineers manually shut down the sirens’ radio system and repeaters. Dallas’ siren warning system is...
Blog

Wonga Says Incident May Have Compromised Customers' Personal Data

Payday loan company Wonga has confirmed that a security incident may have affected some of its customers' personal and financial information. The Britain-based lender says it's currently working to notify affected customers that the incident may have compromised their names, e-mail addresses, home addresses, phone numbers, the last four digits of...