Phishing Campaign Abuses Compromised LinkedIn Accounts

A recently observed phishing campaign was abusing compromised LinkedIn accounts to distribute phishing links via private messages and email, Malwarebytes warns. The attack abuses existing LinkedIn accounts to distribute the phishing links to their contacts, but also to leverage the InMail feature to target external members. The campaign abuses long standing and trusted accounts, including Premium membership accounts that can use the InMail feature to contact other LinkedIn users. The…

September 19, 2017
Read More >>

BankBot Spreads via Utility Apps in Google Play

Several utility applications distributed through Google Play have been infected with the BankBot Android banking Trojan, TrendMicro reports. Initially spotted in the beginning of 2017, when its source code leaked online, BankBot has been highly active throughout the year. Between April and July, the malware managed to slip into Google Play via infected entertainment applications or posing as banking software, and has recently switched to utility apps, it seems. Designed…

September 18, 2017
Read More >>

How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties

Experienced engineers know to “fail safe” the systems they design. This basic principle merely says that a system remains in a safe state in the event of any failure. For data security systems, this means that the sensitive data should remain inaccessible if anything goes wrong with the system. The simplest way of accomplishing this is data encryption. Unfortunately, enterprises often overlook this critical principle when securing their data, even…

September 12, 2017
Read More >>

No Such Thing as Too Small to Hack

Small business owners all-too-frequently believe that they won’t be targeted by hackers because they don’t offer anything of interest to cybercriminals. Since mainstream media outlets tend to solely focus on the “spectacular” large corporate and government breaches, it’s somewhat understand that this misconception continues to fester. But that narrative may be starting to shift – at least a bit.   The U.S. Securities & Exchange Commission recently stated that SMBs…

September 7, 2017
Read More >>

How Secure Are Your Company’s Social Accounts?

HBO, and many other companies, have been faced with that dreaded sick feeling of finding out that someone hacked their Twitter or Facebook accounts. In many cases, businesses are not treating their brand and good-will the same way they are treating other corporate assets like their HR or finance systems. Most businesses force password changes and two-factor authentication on users of internal systems. More forward thinking companies have implemented privileged…

September 7, 2017
Read More >>

Enterprise Security in the Age of Advanced Threats

How Predictive Intelligence Helps to Protect Companies The malware and IT security panorama has undergone a major change, and enterprise security will never be the same. Hackers have improved drastically, both in terms of volume and sophistication, new techniques for penetrating defenses and hiding malware are allowing threats to remain on corporate networks for much longer periods than ever before. Protecting an enterprise is a challenge because an enterprise can…

September 5, 2017
Read More >>

Security Awareness: Watch-Out for Hurricane Harvey Online Scams

As the tragic events continue to unfold in Southeast Texas, the dark side of the Internet is already coming to life with a wide variety of online scams to trick global web surfers. While there are many good causes that need our immediate support, there have already been reports of both hurricane victims and potential donors receiving misleading information that is attempting to deceive. Sadly, both Texans in trouble and…

August 29, 2017
Read More >>

Why the GDPR is Important to Your Organization

The General Data Protection Regulation (GDPR) officially goes into effect in May of 2018 and will have an international reach, affecting any organization that handles the personal data of European Union (EU) residents, regardless of where it is processed. The GDPR adds another layer of complexity, not to mention potential cost and associated resources, to the issue of critical information asset management that so many organizations are struggling to come…

August 14, 2017
Read More >>

NIST Offering Much Needed Guidance for Neglected SMBs

It’s refreshing to see that SMB cybersecurity is getting noticeably more attention on a national level in the United States. Awareness of the risks is growing, and with the Congress and organizations such as the National Institute of Standards and Technology (NIST) publicly playing a larger role in the public discussion, we’re on our way to making some notable inroads. After all, small to medium-sized businesses account for over 46…

August 11, 2017
Read More >>

What Is Hypervisor-based Security and Why Is It Important in Stopping Zero-Day Exploits?

Recent studies show that it takes a company an average of five months to discover a data breach, and 53 percent of these incidents are detected only after an external audit. This is concerning in the face of the current cyber security landscape, where endpoint security is offered with varying degrees of success and data center security is largely uncharted territory. As the complexity of attacks against data centers rises…

August 11, 2017
Read More >>