This Tricky Phishing Scam Manages to Impersonate Legitimate URLS
This post was written by Adam Wosotowsky. This past week, a new web-based phishing scam has emerged that manages to sneakily impersonate legitimate URLs. You heard correctly – this cyberthreat manages to appear to as a secure, trusted website, one such example being apple.com. The deceiving type of attack can be classified as a homograph attack, […] more…‘Aha’ Moments From the ‘Verizon 2017 Data Breach Investigations Report’
The annual Verizon Data Breach Investigations Report (DBIR) was published today. Once again, it is a hefty report that is sure to become one of the most referenced data breach reports in the world. That is because Verizon’s analysis is based on a broad set of real breach data collected from 65 law enforcement agencies, […] more…McAfee Strategic Intelligence/Shamoon 2 Q&A Blog
McAfee has linked a series of cyber-attacks in Saudi Arabia to a common malicious actor rather than to individual cyber gangs in the region. McAfee Strategic Intelligence researchers have released evidence that a series of cyber-attacks targeting the Persian Gulf and, specifically, Saudia Arabia between 2012 and the present are the work of hacker groups […] more…Wired and Tired: 6 Ways to Restore What Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers sheepishly approached in search of wisdom. But reality and time — especially in parenting — become the great equalizers, yes? Even though my kids are now 16 and 22, I more closely resemble a Yo-Yo than the ever-wise […] more…Wired and Tired: 6 Simple Ways to Restore the Things Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers looked to me for wisdom. But even though my kids are now 16 and 22, it’s confusion, not clarity that invades my decision making. And that whole Yoda thing? Yeah — never gonna happen. Raising kids of any age […] more…2017 State Of Cloud Adoption And Security
Hybrid cloud adoption grew 3X in the last year, increasing from 19% to 57% of organizations surveyed. In 15 months, 80% of all IT budgets will be committed to cloud solutions. 73% of companies are planning to move to a fully software-defined data center within 2 years. 49% of businesses are delaying cloud deployment due […] more…How to protect against cross-site request forgery attacks
Cross-site request forgery (CSRF) attacks are becoming a more common attack method used by hackers. These attacks take advantage of the trust a website has for a user’s input and browser. The victim is tricked into performing a specific action they were not intending to do on a legitimate website, where they are authenticated to. […] more…Exploits: how great is the threat?
How serious, really, is the danger presented by exploits? The recent leak of an exploit toolset allegedly used by the infamous Equation Group suggests it’s time to revisit that question. Several zero-days, as well as a bunch of merely ‘severe’ exploits apparently used in-the-wild were disclosed, and it is not yet clear whether this represents […] more…Report Finds Some Health Apps Aren’t Healthy for Your Privacy
One of the big features in today’s Internet-of-Things-centric world is the ability to effortlessly track and record health-related data. In fact, some companies make a lot of money providing users with tools, gadgets and social interfaces to more accurately track fitness and overall health. The abundance of these sensors has created a small cottage industry […] more…Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them
Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products many with the threat allowing a remote attacker to cause a denial of service. First up this week Cisco said a vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of […] more…RawPOS: New Behavior Risks Identity Theft
by Cyber Safety Solutions Team Despite being one of the oldest Point-of-Sale (PoS) RAM scraper malware families out in the wild, RawPOS (detected by Trend Micro as TSPY_RAWPOS) is still very active today, with the threat actors behind it primarily focusing on the lucrative multibillion-dollar hospitality industry. While the threat actor’s tools for lateral movement, […] more…A CMO’s guide to staying secure on a business trip
Executives spend a lot of time on the road (or in the air). And while the speed and convenience of business travel has greatly improved over the years, the challenges associated with information security are only increasing. Your ability to protect your data and devices while traveling matters more than you’ll ever know. Are you […] more…The rising security risk of the citizen developer
While shadow IT was always a challenge for enterprise IT teams, it rapidly started to accelerate with the growth of the smartphone, and then cloud computing with the incredible expansion of public cloud infrastructure and software as a service offerings that made it as easy as providing a credit card to access a cloud service. […] more…Cisco runs out two “critical” security warnings for IOS, Apache Struts (again)
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2. The IOS vulnerability is in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software which could let an unauthenticated, remote attacker […] more…Rising to the Occasion as the New McAfee
As a new standalone company, there’s great opportunity in front of us to recapture our identity. And since our identity lies at the core of everything we do and all our interactions, this opportunity is going to help us reinvigorate both our employee and customer base. More importantly, it’s allowing us to rediscover what makes […] more…Mac OS malware saw a 744% increase in 2016
Many organizations fail to properly interpret IT security threat data or to share threat intelligence, and are unable to turn that data into actionable insights. The result is that many cyber defense systems are ill-prepared to handle the growing number of threats they experience. Those are among the findings of a new cyber security study […] more…More information
- 8 great productivity tips for Chrome
- NetTraveler Is Back: The ‘Red Star’ APT Returns With New Tricks
- Websites Hacked Redirect to Porn from PDF / DOC Links
- Resolved: eCommerce Payment Processing
- CompuCom Cyber-Attack Costs Could Reach $28M
- The Windows worm is back – and this time it’s serious
- These dangerous scammers don’t even bother to hide their crimes
- Hackers who threaten national security could face life sentences
- Apple Says FBI Out to ‘Rewrite History’ in iPhone Case
- Will Bitcoin Succeed?