Cyber Security Insight

If readers have heard about Petya, the newest in a slew of recent ransomware attacks, hopefully it's been through a blog like this. The newest "IT" malware attack to hit the scene, Petya is hidden within documents attached to emails that purportedly come from someone...

DDoS attacks are an ever-present threat in the business world, and can have a huge impact on revenue. But how many of these enterprises are taking proper precautions? What are they doing to mitigate their risk? A report form Neustar provides insight into how enterprises are being...

As part of a new initiative aimed at learning more about their cyber security strengths and weaknesses, the Pentagon is hosting a competition for the best and brightest hackers around the country. The goal? To hack into their network and shine a light on any vulnerabilities...

News of MedStar Health's malware attack, as reported on Monday, was at first met with shock and then a resounding (albeit internal) "Again?!". Unfortunately a lot of healthcare providers across the country have been hit with varying degrees of ransomware attacks. Whether through spear phishing campaigns...

In today’s digital world, “data” has quickly become a top buzz word. Many don't realize that your ISP (Internet Service Provider) is a data aggregator, collecting troves of data about each user online. ISPs and other companies collect enormous amounts of data, leading to the now-familiar...

It may not be breaking news, but this is a major announcement that companies need to embrace: passwords are out; multifactor authentication is in. In it's simplest form, an ATM transaction is an example of multifactor authentication usage - you need to not only produce your...

As the battle rages between Apple and the FBI in the media and courts, more applications and programs are coming to light that use end-to-end encryption. From popular messaging programs and applications to email servers and beyond, authorities from around the world are running into...

Typosquatting has been around for quite some time - preying on those that omit a letter or misspell the intended URL, a user is redirected to a suspicious website with solely malicious intentions. While typosquatting attacks ultimately lead to adware or malware attacks, it is a concerning...

Phishing scams have become so popular and widespread that most are quickly found out and the tips to avoid them follow soon after. No, there isn't a Nigerian prince out there who really needs money. And your good friend didn't magically disappear to Asia, lose all...

Exploit Kits (EKs) are malicious code embedded in a website. They are commercially available and many are easy to use (even by those cybercriminals with little coding experience).  They contain pre-packaged code that seeks to exploit out-of-date browsers, insecure applications, or vulnerable services. They are used...