Critical Security Policies You Should Enforce

Password managers Most users cannot remember complex or multiple passwords. As a result, we find most people will use weak passwords, and tend to reuse that weak password across multiple accounts. If one account is compromised, this could easily lead to complete compromise of all online accounts. By using a password manager such as KeePass, […]

You are your biggest Security risk

You are your biggest security risk You. Yes, you. Not your A/V software. Not your bank, not your job, not your email provider. YOU are the biggest risk to your security. Almost all of us use some form of Social media, and almost all of us have put too much information on social media platforms. […]

Stockfolio trades HDD space for your information

A new Trojan has been identified by Trend Micro, Trojan.MacOS.GMERA, posing as Stockfolio, a Mac based trading app.  The app contains shell scripts that allow it to perform various malicious activities. Two samples have been discovered so far. The first sample is a ZIP archive containing an app bundle and a hidden encrypted file. The […]

Lloyds Bank and “The Rat”

Lloyds Bank has a new trick up its sleeve. Dubbed “The Rat”, Lloyds has revealed a new, high-tech defense system that attempts to detect fraudsters before they have a chance to stop. It’s saved 2,000 customers so far. The technology looks for signs of unusual and suspect behavior when a user logs into Lloyd’s banking […]

FICO introduces Falcon X

Fraud and financial crimes will become a bit more difficult soon thanks to a new platform from FICO called “Falcon X”. Falcon X will run on AWS and streamline both fraud detection and AML processes. FICO Falcon X is available now to financial institutions around the world, as well as other organizations that must comply […]

Zscaler ThreatLabZ discovers InnfiRAT

Zscaler’s ThreatLabZ recently discovered a new Remote Access Trojan (RAT) called “InnfiRAT”. After reverse engineering the malware, security researchers were able to determine that the RAT targets sensitive data, but particularly seeks out Bitcoin and Litecoin wallets and credentials. In addition, the RAT also steals usernames and passwords from browers. Since this is a RAT, […]

Exploit kits that aren’t RIG

Believe it or not, there are alternatives to the RIG Exploit Kit. Here’s a rundown of a few of them. Spelevo Spelevo was discovered in Q1 of 2019. Spelevo exploits a flaw in Adobe Flash Player (No way!) in order to drop the GootKit Trojan. The kit utilizes the CVE-2018-15982 vulnerability, which was previously used […]

Ransomware and Crypto Cybercrimes as popular as ever in 2019

According to new report released by McAfee Labs, Ransomware attacks have grown by 118% this year. New families have been detected, and threat actors have been using new, innovative techniques to evade AV and other protection softwares & appliances. The McAfee Labs Advanced Threat Research team were the first to discover a new family of […]

Best Security Practices for a Corporate Employee

So, you’ve heard about all of the recent breaches and don’t want to be the one who causes the next. Hopefully what you learn here today will help you achieve that goal. Applying best security practices isn’t difficult, it just takes a little thought and effort. Passwords Passwords aren’t tricky. The more complex, the less […]

Amazon hacker Paige “Erractic” Thompson indicted

A federal grand jury has decided to charge former Amazon software engineer Paige Thompson with wire fraud & computer fraud and abuse charges in the indictment announced Wednesday. She’s scheduled to be arraigned Sept. 5.  Thompson was arrested last month on charges that she hacked Capital One and 30 other companies. Sometime between March and […]