New Exploit Uses Disk Images to Deliver Malware

There is a new email attachment exploit making the rounds, that uses a file type called a disk image.  The file extension for this kind of file is ISO.  ISO files are not inherently dangerous, and in the exploit work much the same way that a ZIP attachment works.  This file type can sneak past email security filters because it is generally seen as benign, ...

Continue Reading →
0

Phishing Sites Using HTTPS Too

When you see the secure HTTPS protocol at the beginning of a web address, or see the green “secure site” padlock symbol, does this mean that the site is safe?  Unfortunately, the answer is NO.  There is some confusion among computer users about what HTTPS really means.  This confusion is being exploited by cyber-criminals running phishing exploits.

HTTPS or secure hypertext transport ...

Continue Reading →
0

How Email Accounts Are Hijacked

The most devastating exploit that can happen to you is to have your email account hijacked.  We have spilled a lot of pixels on this subject (see below).  The reason we find this so dangerous is that it is that this is the attack most likely to happen to you.

Google recently released a study that analyzed how Gmail accounts are hijacked.  If you have an Android smartphone, you have a Gmail ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Famous cryptographer’s tombstone cryptogram decrypted

A paper at Schmoocon DC over the weekend revealed a delightful cryptogram on William and Elizebeth Friedmans’ tombstone.  This is a fun story and will introduce you to the Bacon cypher.


Cryptocurrency as the lure, an ISO as the attachment – why not open it?

Phishers are using the hot topic ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Malware Displaying Porn Ads Discovered in Game Apps on Google Play

Google removed 60 games that contained code to display porn pop-ups and other malicious activities.  Click through to see list of bad apps.  If you installed any of them, you will need to remove these yourself.


Visa joins other major credit ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Top 9 Free Phishing Simulators

Looking to run a phishing attack against your team?  Here’s a article from Infosec institute on the top 9 free phishing simulation products.


Your Nigerian Prince is a 67 year old from Louisiana

Sure looks like a prince to me.  Like Prince Charles.  (Those ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


National Tax Security Awareness Week: IRS Helps Taxpayers Protect Against Cyber Criminals

11/28/2017 11:10 PM EST  Original release date: November 28, 2017

As part of National Tax Security Awareness Week—November 27 to December 1—the Internal Revenue Service (IRS) is releasing daily security tips to help taxpayers protect their data and identities against tax-related identity theft.

US-CERT encourages taxpayers to visit the ...

Continue Reading →
0

Google Offers Advanced Protection Program for High Risk Individuals

If you are a high risk or high net worth user of Google’s popular Gmail platform, Google Drive, or other Google services such as YouTube or Google Analytics, Google has come up with an advanced security program for you.

Continue Reading →

0
Page 2 of 7 12345...»