Category Archives: News

  • Russian Hackers Targeting Cisco Smart Install Protocol Systems

    Posted on April 18, 2018 by in News, Security

    Cisco Systems has identified more than 168,000 systems that are potentially exposed via its Cisco Smart Install Client, which the U.S. government said is being targeted by Russian state-sponsored hackers. In an alert issued April 16, the U.S. Computer Emergency Readiness Team said Russian hackers are attacking networking devices, network management protocols and the Cisco […]

    Comments Off on Russian Hackers Targeting Cisco Smart Install Protocol Systems Continue Reading...
  • Three Approaches to Spear Phishing

    Posted on April 17, 2018 by in News

    There are multiple ways spear phishing attacks can be foiled.  While it is best to stop the phishing emails from reaching your colleagues in the first place, stopping the attack at any point will “break the attack chain”.  Good security technology, good security practice, and good security training are all helpful stopping spear phishing.   […]

    Comments Off on Three Approaches to Spear Phishing Continue Reading...
  • Campus Cybersecurity 101

    Posted on April 13, 2018 by in News, Security

    The proliferation of personal mobile devices and homegrown hackers on today’s campuses—not to mention the open, collaborative nature of college environments in general—make cybersecurity particularly challenging in higher education. It’s no wonder cybercriminals consider colleges and universities easy targets. Once a breach in a university’s network occurs, the entire campus can be vulnerable. That’s why […]

    Comments Off on Campus Cybersecurity 101 Continue Reading...
  • US Firms Still Unprepared for Looming Data Privacy Rules

    Posted on April 6, 2018 by in News

    U.S. financial services firms trying to manage regulations and guidance on data protection and cyber security from multiple jurisdictions, are about to face one of their biggest challenges yet when strict new European Union rules governing the use of personal information take effect.A mobile phone simulating a call to German Chancellor Angela Merkel next to […]

    Comments Off on US Firms Still Unprepared for Looming Data Privacy Rules Continue Reading...
  • Intel Redesigns Processors to Patch “Meltdown” Flaws

    Posted on March 16, 2018 by in News

    “100% Patch” As promised, Intel has redesigned its upcoming 8th-gen Xeon and Core processors to further reduce the risks of attacks via the Spectre and Meltdown vulnerabilities, CEO Brian Krzanich wrote. Those fixes are on top of the software updates already issued, which now patch “100 percent” of vulnerable Intel products launched in the past […]

    Comments Off on Intel Redesigns Processors to Patch “Meltdown” Flaws Continue Reading...
  • 10 Ways to Snuff out Spear Phishing

    Posted on March 8, 2018 by in News

    Spear Phishing What is spear phishing?   To define spear phishing, you first have to understand the concept of phishing. Phishing: is an online con game using social engineering and fear tactics in order to get the victim to take the bait. This can be via cold calls, pop-up messages on the computer, text messages […]

    Comments Off on 10 Ways to Snuff out Spear Phishing Continue Reading...
  • Endpoint Devices: The New Battleground for Public Sector Cybersecurity

    Posted on February 23, 2018 by in News

    In the quest for secure systems, there is still one important weak point that many private and public sector organizations are still overlooking: endpoint devices. These are devices such as PCs, printers, scanners, Voice over Internet Protocol (VoIP) phones and smart meters, which carry important and private information from both staff and citizens. Though these […]

    Comments Off on Endpoint Devices: The New Battleground for Public Sector Cybersecurity Continue Reading...
  • Phishy Issue: OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate

    Posted on February 16, 2018 by in News

    You may not be a bit coin miner or own any cryptocurrency, but you could definitely be a target for spear phishing. If there’s anything constant in the ever-evolving technology and threat landscapes, it’s that no platform will be truly immune. Cryptocurrency-mining malware, for instance, first gained ground on Windows systems then went to affect […]

    Comments Off on Phishy Issue: OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate Continue Reading...
  • Hilarious and Heartwarming Surveillance Videos

    Posted on February 9, 2018 by in News

      It’s Friday – how about some levity? We live in a world where surveillance is everywhere. Municipalities have cameras on street corners. Banks are surrounded by cameras. University campuses are covered. Retailers are watching customers and employees. Indeed, thanks to the lowered price of surveillance solutions, a heightened need for surveillance and improved capabilities, […]

    Comments Off on Hilarious and Heartwarming Surveillance Videos Continue Reading...