Fighting sophisticated phishing threats during the digital revolution

Today attacks come across multiple channels such as mobile, web, social network, and email as well. And those cybercriminals are using a combination of social engineering techniques such as email spoofing, phishing, malware, attachment, URLs, and all the tricks to have the end user employees giving out personal or sensitive information. Once a cybercriminal gets…

Zones of Trust: A New Way of Thinking about IoT Security

Recent attacks have focused attention on how to safely add “things”to enterprise networks, a topic that straddles IT and physical security. A zones-of-trust approach may be the answer. Last year, when attackers hacked into more than 25,000 Internet of Things (IoT) closed-circuit TV devices and used them in a denial-of-service botnet attack, this question was…

Mac Malware Reaches New Highs

Two new malware threats in a week this past month, plus others in January, brings the 2017 Mac malware count up to 6 – and growing. On Valentine’s Day, Mac users got a special “treat” in the form of new malware. That same week, there were signs of yet another piece of malware looming. These threats…

Java and Python FTP attacks can punch holes through firewalls

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. On Saturday, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails.

Doubts abound over US action on cybersecurity

How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election. Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show, but they admit that politics and policy conflicts have hampered the…

The Role of the Network in Preventing Dyn 2.0

Much has been said about the DDoS attacks on Dyn and the subsequent security issues surrounding IoT devices.  In late 2016, hackers exploited hundreds of thousands of IoT devices, such as security cameras and DVRs, to cause massive internet outages over a prolonged period of time. While this attack has resulted in an uproar of…

No more ransomware?

Ransomware was a billion dollar problem last year, and it’s getting worse. A new report from Cybersecurity Ventures details dozens of new ransomware attacks over the past 90 days. (Disclaimer: Steve Morgan is founder and CEO of Cybersecurity Ventures.) Organizations stricken by ransomware have been fighting back by providing security awareness training to their employees….

Everyone Is $$$ To Cybercriminals Using Ransomware

More than 50 percent of those polled have been victims of ransomware in some way, shape, or form recently. Nineteen percent are being attack more than 50 times per month and a disturbing 42 percent don’t know how often they’re being attacked with ransomware. These stats should be major warning flags for defenders. Despite our…