Blog

Blog

French Dark Web Posts Ad for Content Cleaner to be Paid in Stolen Goods

The French underground has posted a job ad for a dark web content "cleaner" who will be paid for their efforts in stolen goods. Trend Micro threat researcher Cedric Pernet came across the posting (which is written in French) after making other discoveries in a series of French underground marketplaces. According to the ad, the dark web marketplace...
Blog

Report claims national security was put at risk by the OPM data breach

A Congressional investigation into the devastating hack of the US government's Office of Personnel Management (OPM) has detailed shortcomings in the organisation's security and made recommendations for other federal departments to prevent the same from happening to them. The hefty 227-page report doesn't pull its punches about the seriousness of the...
Blog

Evolution of a 'Cameras Are Everywhere' Society

I remember when I first learned about some of the powerful spy satellites orbiting the earth. Some of the rumors stated the cameras on these machines were so accurate that they could read a car license plate from space. The idea that such technology existed back then was amazing. Now, some of the newer satellites are putting those early spy rumors...
Blog

Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Hutton Hotel became the latest hospitality company to warn customers of a data breach that may have compromised their payment card details. The Nashville, Tenn.-based upscale hotel announced the security incident on Friday, stating it was notified of the potential breach by its payment processor. Subsequently, the company said it began an...
Blog

Yelp Will Award Up to $15K for Exploits Found in Bug Bounty Program

Crowd-sourced review service Yelp says it will award researchers up to 15,000 USD for reporting exploits as part of its newly public bug bounty program. The company successfully ran a private bug-bounty program for the past two years, during which it worked with private researchers and bug bounty hunters to fix as many as 100 vulnerabilities. But to...
Blog

The "Hows and Whys" of an Incident Management Call

Recently, I had a meeting with a potential customer who was looking to invest in Tripwire's portfolio. We got to talking about various aspects of information security—in particular, when companies discover, react to and investigate potential security breaches. The conversation took me back to when I worked in information security as a technical...
Blog

Mega Breach Strikes Rambler.ru with Leak of Nearly 100M User Records

Russian e-mail service provider Rambler.ru suffered a mega breach when someone leaked close to 100 million of its users' login credentials online. Data breach monitoring service LeakedSource said the 98,167,935 leaked credentials are real, information which someone allegedly stole in a hack against the "Russian version of Yahoo" during a security...
Blog

How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics

On 21 August, 2016, the International Olympic Committee (IOC) held the closing ceremony for the 2016 Summer Olympics at the Maracanã Stadium in Rio de Janeiro, Brazil. Hopefully, the celebration symbolized the close of a memorable fortnight during which athletes and spectators alike didn't get hacked and evaded the traps of computer criminals....
Blog

Security Hygiene for Dorm Life

Going back to school, especially college, is a fun time of year. One of the best experiences, by far, is living with other people in a dorm or private shared housing. You can make awesome friends, have amazing parties, and make excellent memories. It's important to note in these shared living situations that hygiene is incredibly important. You don...
Blog

Apple Issues Critical Updates for Spyware Flaws in Mac OS X, Safari

Apple issued critical updates for OS X Yosemite and El Capitan on Thursday to patch security vulnerabilities resembling those discovered on iOS 9.3.5 earlier this week. Dubbed Trident, the three zero-day vulnerabilities (CVE-2016-4655, CVE-2016-4656 and CVE-2016-4657) could allow an attacker to silently jailbreak an iOS device and spy on victims,...
Blog

'Guccifer' Receives Four Years in Prison for Hacking High-Profile Targets

A federal court has sentenced the man behind the 'Guccifer' moniker to four years in prison for hacking a number of high-profile targets. On 1 September, U.S. District Judge James C. Cacheris handed down a sentence of 52 months in prison to Marcel Lehel Lazar, 44, of Arad, Romania. According to a statement released by the U.S. Department of Justice,...
Blog

Survey: Only 34% of IT Pros 'Very Confident' They Could Recover from Ransomware

Ransomware is having quite the year. According to the FBI, crypto-malware authors extorted more than 200 million USD from users in the first three months of 2016. They're well on their way to raking in over one billion dollars by the end of the year. Part of the reason ransomware developers are doing so well, the FBI explains in a letter, is because...
Blog

How one company lost $44 million through an email scam

One of the world's leading wire and cable manufacturers, Leoni AG, has been swindled out of a jaw-dropping 40 million Euros (approximately US $44 million) after it was targeted by an email scammer. As Softpedia reports, a young woman working in the finance department of Leoni's factory in Bistrita, Romania, received an email in mid-August claiming...
Blog

Fraudsters Use Angler Phishing on Twitter to Lure PayPal Customers

Fraudsters are leveraging an emerging social engineering technique called "angler phishing" to fool victims into handing over their PayPal credentials. Researchers at security firm Proofpoint, who discovered this particular campaign, elaborate on what sets angler phishing apart from ordinary phishing attacks: "The attack technique takes its name...
Blog

How AI Can Save Corporate America from Devastating Cyber Attacks

It certainly has been another long week in cybersecurity. First, news that a third party hacked a group allegedly connected to the NSA and made off with secret “hacking tools” rocked the industry. It was shortly followed by news of cyber attacks in the form of smart email “bombs” raining down upon the mailboxes of .gov employees in a way very...
Blog

Dropbox Says Data Dump of 60M User IDs the Real Deal

American file hosting service Dropbox said a data dump of approximately 60 million users' records is real. A spokesperson for the company said the records, which include email addresses as well as hashed and salted passwords, are the same as those affected by a security incident that occurred several...
Blog

Combating the Major Risks Your Business Could be Facing

Organizations face all sorts of risks that threaten to derail their progress and inhibit future growth. The headlines likely don’t provide much comfort as you read about another major company becoming a victim of a massive security breach. There’s a lot to worry about out there, and the tiniest mistake can quickly be exploited, putting your business...
Blog

Back-to-School Tips on How Your Children Can Stay Safe Online

There's no hiding it. The days are getting cooler. The sun's setting earlier. And the leaves are beginning to change. Summer's gone as quickly as it came, which means one thing and one thing only: it's back-to-school season. Soon, kids around the world will be starting up a new year of classes. That means they'll be chatting on line, looking for...