News
  • “When Ransomware Strikes: 7 Steps You Can Take Now to Prepare”
    When it comes to ransomware attacks, even the most prepared company can become a victim. Before an incident occurs, an emergency plan must be in place to ensure that a company can prevent as little damage to itself and its customers as possible. This…
  • "Five Fundamental Strategies for Cybersecurity"
    The Report on Securing and Growing the Digital Economy, released by the Commission on Enhancing National Cybersecurity, provides recommendations for improving upon cybersecurity within the private and public sectors as well as emphasizes the insufficient…
  • Cybersecurity Insurance Succeed where Regulations Fail?
    Interesting article about Richard A. Clarke view on cybersecurity insurance. There are a few key points that he makes that are worth pondering. I added some of my thoughts to it. There is a forum section of the vo if you like engage on the topic.
  • "New Bill Would Transform Cybersecurity at Dept. of Health and Human Services"
    In support of improving upon cybersecurity practices at the Department of Health and Human Services (HHS), the HHS Cybersecurity Modernization Act has been reintroduced by U.S. Representatives Billy Long (R-Missouri) and Doris Matsui (D-California…
  • "Android Security Triple-Whammy: New Attack Combines Phishing, Malware, and Data Theft"
    Researchers at Proofpoint have discovered a single campaign targeting Android devices that has combined the tactics of credential phishing, credit card data theft, and malware in order to gather sensitive banking infromation from financial services and…
  • "A Third of the Internet Is Under DoS Attack"
    Researchers from the Center for Applied Internet Data Analysis, based at the San Diego Supercomputer Center, UC San Diego, have conducted an extensive study in which they revealed that one-third of the IPv4 address space was susceptible to some form of…
  • "Injection Attacks: The Least Glamorous Attack Is One of the Most Threatening"
    Injection attacks continue to be a top threat to organizational networks as indicated by an analysis conducted by IBM X-Force of IBM Managed Security Services (MSS) data. The analysis conducted from January 2016 to June 2017, reveals that injection…
  • "How Wireless Intruders Can Bypass NAC Controls"
    According to Gabriel Ryan, a security engineer at Gotham Digital Science, the utilization of port-based network access control (NAC) devices is still insufficient in protecting an organization’s wireless network if EAP-TLS wireless security is not…
  • "Researchers Analyze 3,200 Unique Phishing Kits"
    Though actions against most phishing sites are quickly executed once they are detected, the impact of such malicious sites could still be extensive enough to satisfy the phisher in the short length of time that they are active. Attackers often exert very…
  • "Hackers Abusing Digital Certs Smuggle Malware past Security Scanners"
    According to security researchers at the University of Maryland, hackers are using compromised digital code-signing certificates to sign malware in order to circumvent system security measures established for signature checking. This tactic is…
  • "Password May Be Stored in Your Shirt Cuff"
    Researchers at the University of Washington are working to improve upon smart fabrics with the use of magnetized textiles to store small amounts of data. The data stored on magnetized textiles can be read by a magnetometer, which could allow users to…
  • "'Combosquatting' Attack Hides in Plain Sight to Trick Computer Users"
    According to a study conducted by researchers from Georgia Tech and Stony Brook University, “combosquatting” is an attack strategy that is increasingly being used by attackers to trick unsuspecting users into clicking malicious sites with URLs that…