Cisco Systems has identified more than 168,000 systems that are potentially exposed via its Cisco Smart Install Client, which the U.S. government said is being targeted by Russian state-sponsored hackers. In an alert issued April 16, the U.S. Computer Emergency Readiness Team said Russian hackers are attacking networking devices, network management protocols and the Cisco […]
Comments Off on Russian Hackers Targeting Cisco Smart Install Protocol Systems Continue Reading...There are multiple ways spear phishing attacks can be foiled. While it is best to stop the phishing emails from reaching your colleagues in the first place, stopping the attack at any point will “break the attack chain”. Good security technology, good security practice, and good security training are all helpful stopping spear phishing. […]
Comments Off on Three Approaches to Spear Phishing Continue Reading...The proliferation of personal mobile devices and homegrown hackers on today’s campuses—not to mention the open, collaborative nature of college environments in general—make cybersecurity particularly challenging in higher education. It’s no wonder cybercriminals consider colleges and universities easy targets. Once a breach in a university’s network occurs, the entire campus can be vulnerable. That’s why […]
Comments Off on Campus Cybersecurity 101 Continue Reading...U.S. financial services firms trying to manage regulations and guidance on data protection and cyber security from multiple jurisdictions, are about to face one of their biggest challenges yet when strict new European Union rules governing the use of personal information take effect.A mobile phone simulating a call to German Chancellor Angela Merkel next to […]
Comments Off on US Firms Still Unprepared for Looming Data Privacy Rules Continue Reading...Spear Phishing What is spear phishing? To define spear phishing, you first have to understand the concept of phishing. Phishing: is an online con game using social engineering and fear tactics in order to get the victim to take the bait. This can be via cold calls, pop-up messages on the computer, text messages […]
Comments Off on 10 Ways to Snuff out Spear Phishing Continue Reading...In the quest for secure systems, there is still one important weak point that many private and public sector organizations are still overlooking: endpoint devices. These are devices such as PCs, printers, scanners, Voice over Internet Protocol (VoIP) phones and smart meters, which carry important and private information from both staff and citizens. Though these […]
Comments Off on Endpoint Devices: The New Battleground for Public Sector Cybersecurity Continue Reading...You may not be a bit coin miner or own any cryptocurrency, but you could definitely be a target for spear phishing. If there’s anything constant in the ever-evolving technology and threat landscapes, it’s that no platform will be truly immune. Cryptocurrency-mining malware, for instance, first gained ground on Windows systems then went to affect […]
Comments Off on Phishy Issue: OSX.CreativeUpdate macOS Cryptocurrency Miner Distributed via MacUpdate Continue Reading...It’s Friday – how about some levity? We live in a world where surveillance is everywhere. Municipalities have cameras on street corners. Banks are surrounded by cameras. University campuses are covered. Retailers are watching customers and employees. Indeed, thanks to the lowered price of surveillance solutions, a heightened need for surveillance and improved capabilities, […]
Comments Off on Hilarious and Heartwarming Surveillance Videos Continue Reading...