Monthly Archives: September 2019
The Myth Behind Frequent Password Changes
Are they good practice or counterproductive? By Sarosh Petkar, BS/MS Student, Computing Security – RIT INTRODUCTION Mandatory password changes are an age-old security practice within numerous organizations. This practice is […]
Ransomware and the Internet of Things
By David Balaban IoT ransomware is more dangerous than traditional ransomware Ransomware has become one of the most serious cyber threats these years. Today, all of us – from home […]
HP Inc. Announces Acquisition of Bromium
HP extends leadership position in securing end point devices HP Inc. (NYSE: HPQ) today announced the acquisition of Bromium, an end point security start-up. Bromium protects enterprises by using virtualization-based security to isolate […]
Office Depot
Allegedly Creative Vulnerability Diagnosis By Charles Parker, II; InfoSec Architect Retailers do not have the most pleasant sets of responsibilities. There are pressures from the staff, management, corporate office, and […]
Shedding the Light on Deep Network Visibility for Cyber Intelligence Applications
DWDM is the backbone technology for optical networks but presents a challenge to government agencies with intercept responsibilities. By Mike Seidler, Senior Product Manager, NetQuest Corporation Dense Wave Division Multiplexing […]
CyberSecurity: Machine Learning + Artificial Intelligence = Actionable Intelligence
By Smit Kadakia, Co-founder, Seceon Overview The goal of artificial intelligence is to enable the development of computers to do things normally done by people — in particular, things associated […]
Cybersecurity is in Focus at Inaugural SecureWorld New York Next Week
Nationally recognized cybersecurity conference coming to Midtown Manhattan; hundreds of InfoSec leaders to learn and share best practices September 25, 2019 • 7:30 a.m. – 3:45 p.m. The New Yorker […]
New Attack with Seldom Used Vector
PowerSniff By Charles Parker, II; Information Security Architect Malware is being coded and released into the wild at an alarming rate. People from across the globe are coding this for […]
Achieving Digital Trust in a World of Data
By Drew Del Matto, Chief Financial Officer, Fortinet Cybersecurity is at a critical tipping point. With massive volumes of data being generated and analyzed across the globe every day from […]
The best practices in dealing with ransomware
By Milica D. Djekic Our society is becoming dependable on new technologies in both – legal and illegal connotation. The hacker’s community is getting bigger and bigger and it’s right […]
Air APT: State-sponsored entities targeting Airline Industry per NETSCOUT
Executive Summary Airlines and the airport industry in general are highly lucrative targets for APT groups; they are rife with information that other countries would find useful. NETSCOUT data from […]
Australia is confident that China was behind attack on parliament, political parties
Australia ‘s intelligence is sure that China is behind the cyberattacks that hit its parliament and political parties, but decided to not publicly accuse it. According to the Reuters agency, […]
Austrian Hotel’s Ransomware Run-In Highlights IoT Vulnerabilities
By Alexandre Cagnoni We’re seeing it everywhere… from lightbulbs and refrigerators to cars and homes… the ongoing adoption of IoT (Internet of Things) in everyday items is on a trajectory […]
This Data is mine, mine, mine, mine.
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. It seems every time I write an article I could mention Trumps’ approach to cybersecurity; watching him is like an old Animaniacs […]
Cyber Security the Major Issue of 2019
By Angelica Technology has provided services to the whole humanity like no time ever before. Now in this contemporary world, everything is connected such as cars, cities, planes, homes and […]
Astaroth Trojan leverages Facebook and YouTube to avoid detection
Cofense experts uncovered a new variant of the Astaroth Trojan that uses Facebook and YouTube in the infection process. Researchers at Cofense have uncovered a phishing campaign targeting Brazilian citizens […]
The Dawn of the DDoS of Things (DoT)
Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led […]
Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril
By Anas Baig If the recent anti-privacy bill’s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their […]
The US Treasury placed sanctions on North Korea linked APT Groups
The US Treasury placed sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The US Treasury sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and […]
Tesco Bank
Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as […]
Nation State Cyber Attacks Emerge from the Shadows
By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information […]
Why today’s university students pose a massive cyber threat — and what to do about it
By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young […]
PART II: DEFENDING YOUR AIRSPACE
WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a […]
Part I: The Anatomy of a Wi-Fi Hacker in 2019
By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they’ll spend […]
Time to Get Serious About Internet of Things Cyber security
By Nate Lesser, Managing Director of MasterPeace LaunchPad The Internet of Things (IoT) is made up of everyday objects built with the ability to sense, analyze, and communicate information about […]
Cyber Security Risks on Social Media
By Simon Parker at Minerva Security As technology advances, social media has gained popularity over time. It has provided a platform where people can freely express their feelings and get […]
The Human in the Middle
Behavioral Design for Cybersecurity By Alex Blau, Vice President, ideas42 In this ever-maturing digital era, using technology to solve our everyday problems feels like an obvious thing to do. Yet, […]
Phishermen
How Insider Threats are Realized By Daniel Jetton, VP Cyber Services, OBXtek, Inc. While technical security problems can be dealt with through technical solutions, people must be approached in a […]
NetCAT attack allows hackers to steal sensitive data from Intel CPUs
Experts discovered a flaw dubbed NetCAT (Network Cache ATtack) that affects all Intel server-grade processors and allows to sniff sensitive data over the network. Researchers from VUSec group at Vrije Universiteit […]
Look into my Crystal Ball; let’s see what 2020 has in store
By Jonathan Stock, Cyber Security Recruitment Consultant, IntaPeople. The Christmas hangovers are starting to clear, every advert on TV seems to tell me that I need to begin the 2020diet […]