Category: Technology

Being aware of all the emerging threats and newly discovered vulnerabilities, along with updates on new and existing adversaries, is an important tool in your defense in depth strategy.   Many attacks are repeated on unwitting organizations that didn’t incorporate emerging news into their approach, and were ready for last month’s attacks. Staying current can involve …

The Wall Street Journal announced today that it was shutting down ‘some’ of its online systems due to a breach of its cyber security. Posted at the Journal’s website online.wsj.com, writers Gregory J. Millman and Jeffrey Trachtenberg report that “The systems have been taken offline in an effort to isolate any attacks, according to people …

As the Brazil FIFA World Cup 2014 moved on to the finals, sponsors, patrons, banks, and organizations suffered significant damage by way of cyber-crime. Brazil’s banks, FIFA World Cup offices, and patrons were all targeted and fell victim to malicious bad actors in the cyber realm.  As countries battled each other on the futbol pitch, or soccer …

You are probably doing all you can and more to build in network and application security in your organization, working to minimize the threat of a devastating cyber attack that can result in brand damage, financial loss, or compromise of key intellectual property. One area that you should examine is any sensitive or critical data …

Putter Panda sounds like a cute name and just saying it can almost bring a smile to your face, until you realize that ‘Putter Panda’ is actually a cover for the ‘People’s Liberation Army Unit 61486’, a cyber unit based in Shanghai that for years has been hacking systems worldwide. Only a few weeks ago …

In the wake of recent data breaches like the ones at Target, Michaels, and eBay it has become important like never before to look beyond the basics in cybersecurity. Two key terms that I like to emphasize is the need for a proactive approach and situational awareness. The security community has been so accustomed to …

CryptoLocker, that infamous ransomware that enters your computer, locks it up, and then demands a ransom to unlock it keeps morphing into newer and nastier versions. The newest, according to CyberheistNews, is being called CryptoWall and has a new process to attack the unwary. Unlike previous versions of ransomware, CyrptoWall does not need the victim …

So called ‘Ransom’ attacks on systems have been with us for a while now.  These attacks occur when an individual opens email to which is attached malware that locks up the computer and offers to unlock it if you pay a ransom for the remedy. According to CyberheistNews, several new twists have been added to …

On Monday, May 25th the United States Justice Department officially indicted five people in the Chinese military for spying on US businesses. Attorney General Eric Holder stated that “This is a case alleging economic espionage by members of the Chinese military and represents the first-ever charges against a state actor for this type of hacking.” …