Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can be found HERE. For those that don’t know what Phishing is, its the cyber attack where a malicious party pretends to be a legitimate source with the goal to trick a victim into clicking a email, accessing a website, or just giving up sensitive data. Here is the Talos article. .
Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes. Nest also announced it was teaming up with another insurance company, American Family. As a matter of fact, for the better and the worst, this is exactly the kind of connection which is going to raise interest in hacking and/or infecting connected objects. Insurance Fraud. Imagine.
State Tech Magazine posted a great article on Threat Intelligence. Click here for the original article. State and local agencies have many options for free sources of actionable security information. Effective security starts with accurate intelligence. Unfortunately, agencies short on budget and personnel may often lack timely access to information they can use to better protect their.
Well it has been a tough time for Katherine Archuleta. With the recent cyber breach and other pressures, she has decided to step down. The Wall Street Journal wrote a great post on this HERE. You can learn more about the breach on datalossdb.org. Below is taken from the Wall Street Journal post. WASHINGTON— Katherine Archuleta, the embattled director of the Office of Personnel Management,.
People have asked me to recommend a tool that can be used to analyze files for viruses that does more than standard anti-virus. Usually the need is to prove something being flagged by a security product is actually malicious verses a false positive alert. There are enterprise level sandbox solutions such as Cisco’s ThreatGRID sandbox that offer this (more on this found HERE) however one.
Fortinet’s FortiGuard Labs has detected a new Flash exploit (MD5:db5df99de775af285e7f1b5355a6bee5) that leverages a vulnerability patched with Flash 126.96.36.199. This exploit uses the classic Flash Player Vector corruption technique. Below is the AS3 code that is responsible for the spray. The original article can be found here As you can see below, it loads the layer 2 Flash to corrupt.
I don’t honestly know how many times I have used my site to emphasize the growing concern of corporate espionage in relation to cyber security threats. The Washington Post reported that law enforcement officials are looking into the St. Louis, MO Cardinals baseball franchise to determine if they breached computer systems and ultimately stole data belonging to the Houston Astros. This will.
A newly unsealed FBI search warrant application illustrates yet another example of how the government deploys malware and uses sophisticated exploits in an attempt to bust up child pornography rings. The 28-page FBI affidavit (text-only, possibly NSFW) was unsealed in a federal court in Brooklyn, New York earlier this month. It describes a North Carolina server hosting a Tor hidden service.
The Darkode forum, which was created about six years ago, can no longer be accessed Darkode – anotorious hacking forum used by Lizard Squad and other cybercriminals – has been shut down after an investigation carried out by authorities in 20 countries. “We have dismantled a cyber-hornets’ nest… which was believed by many, including the hackers themselves, to.
Today, Adobe has released a new announcement of vulnerabilities, 3 of which were discovered by researchers at FortiGuard Labs. Adobe Flash and Shockwave continue to be a challenge for organizations and vendors to keep secure. Memory corruptions can lead to the development of zero-day exploits against systems and there are overlaps in feature sets between versions of Shockwave and Flash. FortiGuard.