The Insider Threat – Part 2

The insider threat, the computer or network attack originating from inside our own network, is the hardest to defend.  In our last post we took a look at the disgruntled employee and the embezzler.  Today we will review insider-based sabotage and corporate espionage.

Sabotage – Sometimes a disgruntled employee will take out their frustrations by orchestrating a little sabotage.  Perhaps they ...

Continue Reading →
0

The Insider Threat – Part 1

Which is a bigger risk to your organization?  A determined outsider trying to break into your network?  Or an insider, an employee or coworker who is already on the network as a credentialed user?  Obviously, it is the insider who represents the greatest threat.

In truth, all successful attacks become insider attacks.  The determined outsider who finds a way into your network is ...

Continue Reading →
0

New Phishing Scams Look So Real

There has been a stream of email alerts arriving at my inbox lately that warned of a variety of new phishing approaches that are using well-known brands (OneDrive and Office 365, FedEx and UPS), trusted sources (Department of Homeland Security, Gmail, Yahoo Mail), secure services (TLS certificates and HTTPS web sites) and curiosity (you received an encrypted message) to trick recipients into clicking a link that leads to a fake ...

Continue Reading →
0

The New War With Iran

If you think that the US government called off the new war with Iran, you are mistaken.  President Trump cancelled the air strikes due to the potential loss of civilian lives, but cyber war options were in play, and is being aggressively waged by both sides.

President Trump called for a cyber attack against Iranian missile control systems on June 20th.  These attacks ...

Continue Reading →
0

Guest Post – AI: What should we expect?

Here is another intriguing guest post by Melisa Marzett.

This question was raised long time ago in old science-fiction films. Though those depictions were rather primitive, people started asking questions, for example, what else are they capable of, and how long will it take to develop such intelligence. In these films, the only thing these machines want is to ...

Continue Reading →
0

Guest Post – Don’t Let Your Phone Stalk You

The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones.  Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.

Stalkerware is not limited to Android phones. It can be ...

Continue Reading →
0

Guest Post – Can You Trust Your Trusted Sources?

What follows is a sponsored post from cybersecurity firm Sequretek.

Businesses usually tend to trust their partners/ technology partners when related to the security of the data flowing across partners. This approach has changed drastically these days; now businesses themselves need to focus on their cyber security measures. There is a sudden rise in the number of supply chain attacks, by which we can conclude that attackers are easily spotting out vulnerabilities in the supply chain network of the organisations. Today, ...

Continue Reading →
0
Page 37 of 107 «...1020303536373839...»