There’s seemingly no end to the avenues for hackers to penetrate protected systems. From simple (yet dishearteningly still effective) email phishing to DDoS overloads to high-complexity malware/ransomware custom-built for specific targets, hackers are becoming ever more effective and creative in gaining access to sensitive systems. But the first line of defense is still your employees, and in a recent snafu, … Read More
The skinny on LockerGoga, a terrifying new ransomware variant
We’ve seen all manner of ransomware in the last decade. From innocuous varieties to the devastating ones, ransomware is one of the largest (and growing) threat vectors for cybersecurity teams (or managed service providers if you outsource that sort of thing). One of the newest iterations on the scene, with a terrifying wrinkle, is called ‘LockerGoga’ — here’s what it … Read More
Triton is the rare malware that can cause physical harm (and even death)
When we think of cyberattacks, we tend to think in digital terms. It’s typically digital tools that gain access to digital systems that hackers then use to their assorted nefarious ends — whether that be ransom, blackmail or anarchic destruction. Often the data stolen is digital itself, the demands are presented digitally, and if assets of one kind or another … Read More
Executive phishing — the newest security threat sweeping the nation
In any enterprise, keeping your team abreast of the newest and most nefarious security threats is paramount to both operations as well as your bottom line. According to IBM’s ‘Cost of Data Breach Study‘, “the global average cost of a data breach is up 6.4 percent over the previous year to $3.86 million. The average cost for each lost or … Read More
7 New Year’s resolutions to keep your company’s data safe
In our first post of 2019, we laid out 4 areas of cybersecurity threats to watch out for in 2019; but telling you about threats isn’t enough to help you combat the malicious actors out there, so we also promised some New Year’s resolutions to help. So, here you are: 7 resolutions to help keep you digitally safe in 2019: … Read More
4 cybersecurity threats to watch out for in 2019
2018 saw a glut of cybersecurity disasters at some of the highest levels of industry and government. From the ~$10 billion NotPetya debacle to Marriott’s 500-million-guest-record theft (which actually started in 2014 and lasted 4 full years, to be fair), it was a banner year for digital criminals. This dangerous environment has cybersecurity as a top item on a lot of … Read More
Infrastructure hacking against the U.S. is proliferating — what does that mean for you?
As we wrote about last month, cyberattacks are getting both more complex as well as destructive. For so many people, this has only meant credit card companies sending you replacement cards from time to time, or possibly Equifax offering you free credit monitoring for a year after allowing a massive data breach, or an inkling that your social security number … Read More
Is voice hacking the next line of attack for threat agents?
It’s a brave new technological world out there, and it seems to reinvent itself every couple of years. What was inconceivable only a few years ago goes from Hollywood fantasy to ubiquity in the proverbial blink of an eye. Virtual assistants like Iron Man’s J.A.R.V.I.S. leapt off the screen and into our homes via Alexa and Google Home. James Bond … Read More
Cryptocurrencies and blockchain are all the rage — they’ve also inspired sneaky malware you need to know about
Not all malware is designed to extort. Much of modern cyberattacks do have some sort of ransom or monetary aim, and to be sure, the ransomware do tend to get a lot of the headlines. Other malware is aimed for anarchy, like we detailed in our last post about NotPetya, the most expensive cyberattack in history. But other malware is, … Read More
Why hackers target you through IoT, how to spot a breach and how to protect yourself
In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More
Dive straight into the feedback!Login below and you can start commenting using your own user instantly