Articles
-
Articles
Pirated Apps Target iPhones And The Children Who Use Them
Hackers and other nefarious actors look to take advantage of children who are not aware of the personal information an app can request for download.
Read moreJuly 11, 2019
-
Articles
Report Finds Banking Malware On The Rise...Again
Banking Trojans are still among the most popular attack vectors and getting banking credentials from corporate users can yield a much higher payoff than “merely” from consumers.
Read moreJuly 10, 2019
-
Articles
New Malware Techniques
Researchers at Palo Alto Networks found Xbash lurking around and believe that the Chinese speaking Iron Group (also known as Rocke) has their grubby hands in it.
Read moreJuly 05, 2019
-
Articles
Tips for Securing Your Mobile Devices
Nearly all of us these days have some type of mobile device that is essentially a part of us. It is filled with all kinds of personal information, such as our contacts, our email conversations, and perhaps even our health information.
Read moreJuly 03, 2019
-
Articles
Rise in Ransomware Attacks
Organizations are facing drastic increases in ransomware attacks. A report by Malwarebytes finds a 90% increase in such attacks since 2016–that’s almost ten times the amount of attacks since 2016.
Read moreJuly 02, 2019
-
Articles
Malware in Digital Ads
Read moreJuly 01, 2019
-
Articles
Best Bank Account Cybersecurity Tips
Financial institutions and hacking go hand-in-hand these days and keeping your bank account and credit from being the next victim is more important than ever.
Read moreJune 27, 2019
-
Articles
Security Risk Assessment Tool: TraceSRA
Learn about the TraceSRA, a security risk assessment tool modeled after the HHS tool but with improved usability and enhanced feature sets.
Read moreJune 24, 2019
-
Articles
Understanding Integrity Controls
One of the many recommended practices in cybersecurity is to employ "integrity checking mechanisms" to verify software, firmware, and information integrity. As a cybersecurity consultant, clients often ask me for clarification, or in some cases, implementation guidance for this practice. This is not surprising given the many use cases and interpretations for integrity checking. And to make it worse, the answer can differ dramatically depending on the operating environment. Given these factors, I thought it might be helpful to "de-mystify" the subject of verifying software, firmware, and information integrity.
Read moreJune 24, 2019
-
Articles
Types of Penetration Testing
Read moreJune 03, 2019