Cybercrime exploit kits are booming
In a new DNS Threat Index report from Infoblox, in the third quarter of 2015, malicious domain creation for exploit kits increased 75 percent. This indicates that the command-and-control (C&C)...
View ArticleHow Hard Is Cybersecurity Exactly?
Cybersecurity is tough. You are supposed to figure out how to control the uncontrollable. You are expected to guess the unguessable. Then you need to measure what you did and give it a value. And you...
View ArticleShedun Trojan goes solo
Mobile security company Lookout, warned users earlier this month about auto-rooting Android malware when they detected over 20,000 samples of trojanized adware featuring Shuanet, ShiftyBug, and Shedun....
View ArticleChina, Japan, South Korea Talk Cyber Issues
In mid-October, China, Japan, and South Korea convened for the second time in order to discuss potential cooperation on cyber issues such as international rules governing cyberspace, and cooperation...
View ArticleCable modem remote backdoor, inside a backdoor
A backdoor inside a backdoor. Sounds ominous doesn't it? The bad guys simply love it Your Internet Service Provider (ISP) can be your weakest link, in the realm of cable modem security. Some ISP's rank...
View ArticleLuxury hotel chain hit with malware
If you stayed at the Starwood Luxury hotel chain between November 2014 and October 2015—payment systems at 54 of its hotels in North America was infected with malware. Customers who did not use the...
View ArticleHacking — Why Jonnie Can't Hack
Hacking is the closest thing the general public knows to be an unknown, unexplained power that some people possess — like magic. Therefore Hacker is a powerful word for the general public. It means a...
View ArticleSecurity and the holiday shopping season
The shopping season is about to erupt in full swing beginning on Black Friday. Many retailers are even extending their Cyber Monday sales to be cyber week sales. This is the time when consumers should...
View ArticleHow to Get the C-Suite Fired in the 21st Century
C-Suite mergers and acquisitions Hola readers! (Being in Panama, I need to improve my Española) Hoping everyone had a safe and joyous Thanksgiving. Before launching my own company in July, I worked...
View ArticleCyber Monday shopping requires elevated cyber-vigilance
According to the National Retail Federation's (NRF) consumer sentiment survey, 121 million (49.5%) shoppers plan to shop online on Cyber Monday. “Unlike ten years ago, we live in a world in which you...
View ArticleLocked iPhone or iPad held for ransom? It's a quick fix
One of the latest scams that the Better Business Bureau (BBB) has on their radar this holiday season involves malware that locks a victims phone for ransom. This scam is currently limited to iPhone and...
View ArticleEverything’s “Big” When It Comes To Cyberterrorism – And It Shouldn’t Be
In the aftermath of the Paris terrorist attacks, there has been increased scrutiny as to how these individuals successfully pulled off coordinated attacks without intelligence and security services...
View ArticleOne out of five CEO's concerned about information security
According to a recent KPMG 2015 CEO Outlook Study of more than 1200 global CEO's from Australia, China, France, Germany,India, Italy, Japan, Spain, UK and the US—one out of five CEO's indicated that...
View ArticleVulnerable OS? Pony-up with CryptoWall 4.0
There is a new string of windows drive-by-campaigns that is spreading the Angler Exploit Kit via injection of malicious code into compromised web pages. This new "cocktail" of malware steals windows...
View ArticleTighten up your cybersecurity strategies now
While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this...
View ArticleUK Pub chain data breach
UK Pub chain JD Wetherspoon announced today that their company has suffered a data breach of customer and staff information that was accessed illegally by a third-party. No financial data or customer...
View ArticleChina and the United States to Hold Senior-Level Cybersecurity Talks
In December 2015, China and the United States began their first ministerial-level discussions on cybersecurity. According to a news report, the Director of the Department of Homeland Security and the...
View ArticleSecurity Intelligence—Know your enemy
According to a recent KPMG 2015 CEO Outlook Study organizations need to invest in the right tools and the right people. The study found that organizations need visibility first in order to know if they...
View ArticleIt could be a BackStab—if your backup is not encrypted
Palo Alto Networks recently released a new report that depicts an attack technique called BackStab. This attack has the ability to steal backup data from Mac and windows infected computers. Though...
View ArticleThreats to Defense Contractors—it’s no longer just Ones and Zeros
Today, I would like to bring to your attention another threat that specifically creates a threat to the Government Defense Contractor community. Is it a new zero day? Nope Is it information regarding a...
View Article
More Pages to Explore .....