May 30, 2016

Even with isolated networks, nuclear power plants are still infested with malware

You might imagine nuclear power facilities to have state-of-the-art security, with locked-down computers that can only run software that the installers authorized. Well, this doesn’t seem to be the case in some facilities. At a nuclear power-plant 75km from Munich, Germany, employees discovered serious pieces of malware, including Conficker and Ramnit. In addition, they discovered 18 USB drives that had malware on them in the facility. And this isn’t the only case.
May 30, 2016

When there's a choice between privacy and sizzle Google usually goes with sizzle by default

Google is offering an innovative messaging product called Allo to compete with other mobile messaging apps. It has features like suggesting responses to messages from your friends, to save you time. But to do this, it needs access to all of the message content. On the other hand, you will have an option to turn on end-to-end encryption, which uses the secure SIGNAL protocol... On the other hand, if you do turn on the end-to-end encryption feature, you won't get the "sizzle" features like the message reply suggestions. So, let's just be clear about privacy versus convenience.
June 3, 2016

A live recorded example of how attackers get into online accounts using social engineering

If you think companies you trust have good security practices for authenticating their customers in phone support calls, you may be right. But the security of call-centre support processes is becoming a serious issue. Every call-centre rep is human, and humans respond to emotional situations in different ways. This is what many attackers are learning to exploit.
June 9, 2016

It just got more expensive to lose your personal information to identity theft

In one sense, it’s hard to believe it’s taken so long for identity theft to get to this point. At least, up until now, most of […]
June 26, 2016

Many LinkedIn users don't seem to be aware of risks from fake connection requests

By now, you might think that employees are able to distinguish between legitimate LinkedIn connection requests and those from people using faked profiles. Unfortunately, recent statistics […]
June 30, 2016

Why is the Security Team trying to trick us? – The #1 Pitfall of Employee Phishing Assessments

Many organizations are now starting to do internal employee phishing assessments to determine how vulnerable their team is to targeted phishing attacks. This is because phishing is one of the primary ways that ransomware makes its way into corporate networks - through emails targeted at employees who click on links or attachments. Your IT Security team can assess your organization's vulnerability in this area by simulating attack emails, but with harmless links or attachments that can provide feedback to IT Security. But when your IT Security team undertakes an employee phishing assessment initiative, there are many subtle decisions that must be made that can have in impact not only on the validity of the results, but on employee morale and trust. So, I'm creating a list of dangerous pitfalls to be avoided when implementing an employee phishing assessment program. Not fully considering the employees' responses to these emails is probably the easiest landmine to step on, which can cause serious employee backlash, and put the program in jeopardy. Here's the problem and the solution.
June 30, 2016

This old email attachment icon signals a new danger

We all tend to know that email message attachments can be dangerous. There are many file types and associated icons we should actually be careful with. […]
July 29, 2016

Think your mobile device can't be held hostage? Think again.

Ransomware has evolved as a very dangerous threat to computers and networks. Becoming infected with ransomware is especially costly for businesses that rely on databases of constantly changing information for their daily operation, like hospitals and universities. So, we tend to think that only databases with very sensitive information are likely to be targeted for this kind of extortion by attackers. On desktop computers, there were many ways in which attackers can get malware to encrypt your files and hold your computers hostage. But, while it’s somewhat harder for attackers to encrypt critical data on your mobile device there are a couple of new kinds of extortion that could hit you closer to home – forcing you to pay up to regain access to your mobile phone or tablet.
July 29, 2016

When this popped up in a DNC worker's webmail session, it should have given pause

Sometimes we are so well trained to ignore suspicious pop-up messages while using a web browser that we may miss some important clues about imminent risks […]
August 31, 2016

Employees selling company secrets and access on the Darknet

What would your employees do if they had the chance to sell company secrets without getting caught? Some large organizations are finding out that their employees […]