Archive for the
‘Uncategorized’ Category

The Internet of Things Internet of Things (IoT), the term given to all our gadgets that are connect to the internet.  Webcams, to smartwatches, to medical devices and home appliances, all are IoT devices.  While IoT devices makes our day to day lives easier, it may be vulnerability.  IoT devices are often overlooked when it […]

A New Way for Phishing Over the past year Phishing sites have been increasingly using HTTPS.  As HTTPS begins more popular in general this is not entirely a surprise; but, the increase is more than expected.  Further, HTTPS is not necessary for a phishing site to function.  Towards the end of 2017 a quarter of […]

The Dark Web A dark web monitoring firm called 4iQ has discovered a mass of data on the dark web.  In simple terms the dark web is areas of the internet that are not indexed by search engines and so need special ways to reach the site.  It is also much harder to track people […]

What is Ransomware? Ransomware has been in the news a lot lately. Ransomware is malicious software that encrypts the data on a victim’s computer making them inaccessible until a ransom is paid to the attacker. The success of these attacks means we are likely going to be seeing a lot more of it.  One of […]

Meltdown and Spectre Processing chips are a fundamental part of functioning computer.  Rarely do we see flaws in such integral hardware.  Now two separate flaws have been found that appear to impact nearly all processing chips.  Nicknamed “Meltdown” and “Spectre” these are flaws that go all the way down to the architecture of the chip; […]

Second Hand, Could it be Tampered With? Beware of the deal too good to be true when it comes to internet connected devices.  For many things buying second hand is a great way to get a deal.  When it comes to your internet devices you should be a little more careful.  A compromised device will […]

A Infrastructure Attack A new Trojan virus was found. This virus targets critical infrastructure.  Exact details of the attack have not been given due to the nature of the event.  There is some information that we do know.  First the virus did cause an outage, but not in a way it was likely intended.  Second, […]

The Focus on Prevention Cyber criminals and cyber threats are always evolving.  For many businesses cyber defenses focus purely on prevention, stopping an attack from happening.  While this is good, often it is just not enough.  The reality is that in a more and more complex cyber world it can be nearly impossible to prevent […]

Malware too tough to die It’s been around for a long time, since early 2012, and it’s attacking in force once again.  Called Necurs, it is now possibly the largest active botnet.  Botnets expand to secretly takeover target devices allowing a master device to take control.  With over five million zombies (the term for infected […]

New Phishing Attempts Several new Trojan phishing attempts are making the rounds using some old and some new ideas.  Phishing attempts typically attempt to trick a victim into entering their credentials into a fictitious website that mirrors a real one in an attempt to gain personal data or access to accounts.  The new phishing attempts […]

Loading posts...
Sort Gallery
Enter your email here