How to Spot Fake Login Pages
Have you ever come across a website that just didn’t look quite right? Perhaps the company logo looked slightly misshapen, or the font seemed off-brand. Odds are, you landed on a phony version of a legitimate corporation’s website—a tried and true tactic relied on by many cybercriminals. Fake Login Pages Explained A fake login page is essentially a knock-off of […] more…Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected devices left and right and is expected to own 15 connected devices by 2030. While they vary from person to person, recent research shows that the most popular connected devices tend to be smart meters, […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…Oh No! 8 Signs that Grandma’s Getting Baited by a Catfish!
His name was Colonel Lance Shimmeroff. He was a retired U.S. Army officer and happened to be an ace Words With Friends player, according to my 75-year-old mother, who no one in the family could beat at the online game. They played the game often, and he impressed with his word combinations and witty banter. […] more…Are Your Online Mainframes Exposing You to Business Process Compromise?
by Roel Reyes (Senior Threat Researcher) Legacy mainframes are still used by enterprises to handle big data transactions across a range of industries, from financial institutions, telecoms, and internet service providers (ISPs) to airlines and government agencies. Why are they still in use? As the saying goes: “if it ain’t broke, don’t fix it”. But […] more…How to Secure the Future of the Internet of Things
The world of security for the Internet of Things just became more complex. IoT devices are no longer a potential threat to their owners; now they pose a significant threat to everything connected to the Internet. The old IoT security problem For the past year, the cybersecurity and IoT communities have been at odds regarding […] more…Multiplatform Boleto Fraud Hits Users in Brazil
A study conducted around June last year revealed a malware-based fraud ring that infiltrated one of Brazil’s most popular payment methods – the Boleto Bancário, or simply the boleto. While the research and analysis was already published by RSA, we’ve recently discovered that this highly profitable fraud is still out in the wild and remains […] more…How Do I Keep My Kids Safe On iPhone?
A friend had recently been on a trip to Singapore and among the many purchases she made was her dream phone, the gleaming black temptress, the iPhone! From the time of their return, however, she hardly gets to use her iPhone or gloat over her new acquisition. The reason is her two middle-school going kids- […] more…More information
- Facebook 2FA phish arrives just 28 minutes after scam domain created
- Resolved: ENCS Website and Form Issues
- Shipping Giant COSCO Hit by Ransomware
- Microsoft Windows Kernel CVE-2015-2549 Memory Corruption Vulnerability
- Managing File Transfer and Improving Compliance
- Resolved: WebAccess Outage
- Facebook Takes Legal Action Against Data Scrapers
- Drata to Acquire SafeBase in $250 Million Deal
- Russian forensic firm’s tool snags iCloud backups without an Apple ID
- AI Can Help Apple Watch Predict High Blood Pressure, Sleep Apnea