Category Archives: Cybersecurity

Nearly 1.4 Million New And Unique Phishing Sites Created Monthly

Posted on October 19, 2017 by Admin

If you take the Public Service Announcements (PSA) from the FBI seriously, you will be a bit on edge about one in May. It claimed that phishing scams cost businesses in the United States over $500 million each year. That’s nothing to cough at. In fact, phishing scammers are taking advantage of phishing at breakneck rates. Webroot recently released its Quarterly Threat Trends Report breaking the news that 1.385 million new and unique phishing sites are created each month.

Unfortunately, there


Posted in Cybersecurity, Social Engineering

WiFi Flaw Leaves Everyone At Risk

Posted on October 16, 2017 by Admin

It is not a trick and most certainly, is not a treat.  A researcher from a university in Belgium has discovered a weakness that can be exploited in nearly all WiFi routers. It is cleverly being referred to as KRACK, which is an acronym for “key reinstallation attacks.” Suffice it to say, that anyone using a WiFi connection is vulnerable to possible attack until the patches are released from the vendors.

All operating systems have this flaw, but the most at risk is Android 6.0 (Marshmallow)


Posted in Cybersecurity, Social Engineering

Research Shows Americans Lack Cybersecurity Smarts

Posted on October 12, 2017 by Admin

Research shows that a majority of American adults who go online have limited knowledge and understanding of cybersecurity basics. It’s important to be aware of the prevalent threats and how to protect against them. Tools installed at the perimeter of any network can only do so much. No matter how many of those tools are installed on any network, a simple phishing email can bypass them and land in a user's inbox. Social engineering is a powerful method for hackers because they count on


Posted in Cybersecurity, Social Engineering

New Phishing Campaign Delivers Fake Invoices

Posted on October 9, 2017 by Admin

The name Dridex may be familiar to some. Recently, it was found by researchers at Trustwave in yet a new form that targets users of the cloud-based accounting firm, Xero. It is one of the most notorious banking Trojans and is designed to hang out on the infected computer and monitor browsing activity. It lurks in the background just waiting to steal sensitive information that is related to financial institutions in a list. It’s been active over the past year and has been evolving with each


Posted in Cybersecurity, Social Engineering

Research Shows Americans Still Don’t Practice Good Password Use

Posted on October 6, 2017 by Admin

A recent survey by Wakefield Research provides an eye-popping glimpse into how Americans have gotten sluggish with their passwords. An unsettling 81% agree they use the same passwords for  more than one account. However, those surveyed are savvy users who know the dangers of reusing passwords; yet they still do it. And for millennials the news is worse. An incredible 92% admit they use the same password for many accounts over many sites. This disturbing trend isn’t unique to Americans and


Posted in Cybersecurity, Social Engineering

How To Build an Incident Response Capability (That Doesn’t Suck)

Posted on October 4, 2017 by Admin

You’re standing on the bridge of the Starship USS Enterprise.

“Warning,” comes the voice of the computer. “Incoming attack detected.”

Immediately, your crew launch into action. Under your command, your officers identify the threat, take evasive action, and shut down the enemy using photon torpedoes.

The confrontation is intense, but within minutes your victory has been assured.

Sounds good, doesn’t it?

But here’s the thing. If you’ve ever seen Star Trek, you’ll know that all the screen


Posted in Cybersecurity, Information Security, Security Awareness Training, Social Engineering

Amazon Reviewers Gifted $50 In Exchange For Their Prime Credentials

Posted on October 3, 2017 by Admin

Are you one of the 80 million Amazon Prime members who gets excited for “Prime Day" and subsequently becomes all giddy like a child with a new toy when your purchases arrive in two days? If you are, you may be targeted with a phishing scam that seeks to get your Prime login credentials out of you. This new one asks you to conveniently review your Amazon Prime Day purchases by clicking a link in an email and promises $50 gift card.

Unfortunately, it’s a phony site and there is no gift card.


Posted in Cybersecurity, Social Engineering

Girl Scouts Take on Cybersecurity

Posted on July 21, 2017 by Admin

July 21, 2017

Putting cookies in perspective, Girl Scouts USA (GSUSA) will offer cyber security badges starting in 2018. In a two-pronged approach, GSUSA embraces their growing concern for the safety of its young Scouts online. They also take aim with the significant lack of career focus for girls and women in IT and other sciences. Girl Scouts from 5 to 12 years old will be poised to pin on those 18 new badges in the coming year.

In 2011, the GSUSA challenged the future of its Scouts by


Posted in Cybersecurity, Information Security, Security Awareness Training, Social Engineering

Cybersecurity 102: Going Beyond the Basics

Posted on June 26, 2017 by Admin

There comes a time when every security conscious organization needs to move beyond the basics.

After all, basic protocols such as solid vulnerability management or least-privilege user access controls are highly effective, but they won’t be enough to stop truly persistent threats.

Perhaps your industry is heavily targeted by organized crime groups. Perhaps you’re worried about next generation ransomware, or you just can’t risk taking a hit to your reputation.

Whatever your situation,


Posted in Cybersecurity, Information Security, Security Awareness Training, Social Engineering

People: Security Asset or Liability?

Posted on June 5, 2017 by Admin

In the security world, people get a bad rap.

And it’s not hard to see why. Between social engineering, insider threats, and straight up human error, there are plenty of ways for your users to put the organization at risk.

In fact, according to many reputable sources, human error is the single greatest cause of data breaches.

So why, then, when we look at the average organization’s security budget, do we see so little attributed to security training? After all, budgets are supposed to be


Posted in Cybersecurity, Information Security, Security Awareness Training, Social Engineering

Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint