Home / Blog
Do you know how to prevent tax fraud?
While IT professionals and tech specialists should know better, behaviors like sharing passwords, sloppy mistakes from working too quickly, and using outdated tools and software are problematic at the Help Desk too.
Last month, McAfee compiled a list of the top 12 scams to look out for the during the 2012 Christmas season. Here are some highlights.
Drumroll, please! The 25 worst passwords of the year are...
As we wind down to the end of year, it’s a good time to take inventory. And, in a recent CIO.com article, Sarah Jacobsson Purwal asks just the right question: “Just How Hackable is Your Digital Life?”
Just in time for early Christmas shopping…PIN pad hackers attack Barnes and Noble stores in nine different states.
The great flood of election-related spam has started to fill inboxes everywhere—and anyone paying attention knew it was bound to happen eventually.
Will your preference for heels or flats make or break your security on the Internet? Probably not. But the new program does raise some interesting questions about the path that web security may be taking.
Security may begin adding biometric components very soon. Freaky.
Why do so many employees who get "trained upon arrival" still make so many security mistakes?
So, despite all the blogging, all the warnings, and all the news about security breaches, here's a list of assumptions that supervisors should probably make. After all, as employees, we are only human....and convenience obsessed....and sometimes a little careless...
It's "Back to School" time! Did you pack an extra layer of security awareness protection next to those number 2 pencils and pocket folders?
Glad to know I'm not the only one who lets my imagination run away with me when it comes to social engineering or phishing scams. And not the only one who, despite the potential consequences, can't help but think about how a harrowing personal experience might translate into a good blog post.
All the buzz about phone security, operating system patches, and protection plans provide no remedy for the classic crank call. That’s why more and more social engineers are headed back to hacking the old-fashioned way.
Just wanted to post an addendum to last month's blog post about online romance and internet scams. Now State Farm is getting in on the warning bandwagon.
As a security company, we are always on the lookout for news and information about recent breaches. And lately, finding topics for blogging has been a little too easy.
Sadly, 2012 has already been a big year for security breaches.
It seems that true love just can’t catch a break. Now it seems that finding your perfect match via the World Wide Web can be more dangerous than magical.
Sure, businesses are concerned about future fees for Facebook posts or how best to market to a younger, tech-savvy customer base. But some companies and managers are waging a social networking battle with their own employees.
If you see ads on Wikipedia, you may be infected.
Clever! A new service gives you more control over who can read your social networking messages.
Unfortunately for Android users, it looks like the malware plague is just getting worse.
Sometimes, spam emails even fool the professionals.
We all know to be on the lookout for suspicious links in emails—but are we equally careful when it comes to what comes in our physical mailbox?
As we ring in the New Year and plan to start 2012 with a renewed commitment to network security, let’s review the list of the five biggest database breaches of 2011.
Our trash—and the things we recycle or carelessly dispose of—may be a social engineer's pot of gold.
Yeah...that guy...that guy that just followed you in from the parking garage because you politely held the door for him. He could be a social engineer.
Yes, the name is ridiculous. But “vishing” is a serious threat, when social engineers use voice over IP (VoIP) to get personal or financial information from unsuspecting individuals.
According to a recent study by the Ponemon Institute, companies aren’t just losing pennies through low productivity here or there. 52% of the organizations in the study have also experienced an increase in malware attacks because of social media use.
No one likes a thief, of course. They lie, steal, cheat, and take things that don’t belong to them. But honestly, do they have to be so insensitive?
Gone are the days when IT geeks and burly security guards operated in their own worlds. The organizations that are most effectively dealing with social engineers are also those that have a tag-team approach.
So there is a little thing called SSL that pretty much keeps the Internet up and running and safe. And apparently, these two researchers—Duong and Rizzo—plan to prove that they have successfully found a way to crack the code.
Our FraudReady audit is proven…and we developed it legitimately. http://rocketready.com/FraudReady
Apparently, it might be unsafe to plug your iPad, iPod, iPhone or other phone with USB capabilities into a public port. Um, duh?
Apparently, spam, particularly the kind with dangerous attachments or embedded links, is at a two-year high. Well, one quick glance at my inbox could have told you that—and your email accounts are probably equally cluttered with junk.
Android user, listen up! Things are getting worse.
An individual’s Personally Identifiable Information (PII) has become easier and easier to access—so why are we still using it all the time?
Don't forget: there might actually be worms in your Apple.
It's a "finder, keepers" world, right? Some social engineers are banking on it.
And now for something completely different: a fruit basket of interesting security articles from the past week.
How far do you go when classifying who is a social engineer?
Let’s call that last article “Sit Tight and Don’t Panic.” And let’s call this one “ Be Smart and Do Your Homework.” By homework, we simply mean doing a little extra checking before you hand over sensitive information through a phishing email.
The Epsilon hackers may have your email address—but don't panic! Remember that it is probably useless to them unless you fall for their scheme.
It may take months to get your company's website just right—but it takes only minutes to rip it off.
The cost of security breaches is going up—and if you aren't training, then your company may be next.
Small mistakes can evolve into massive—and costly—errors.
Turns out, our cameras and other technology may be too smart for our own good.
We are professional ethical hackers—and if you aren’t careful, we’ll get you every time.
Uh oh! That picture you posted (yeah….THAT picture…) suddenly isn’t private anymore.
Social engineers will resort to anything—even mean threats and slander—to get your valuable personal information.
Who's the most gullible of them all? Apparently, it's iPhone users.
I'm a mid-30's Virgo who owns a house in a moderate income neighborhood. And you are...?
Alright, hackers. Now it's personal.
Yeah, I am pretty security-saavy. But this week I learned about fake A/V...and I panicked a little.
Think back to your junior year of high school...
I love lists. Boy, do I ever love lists. And here's a good one...
It promised that, if I looked inside, I would not be disappointed...
Why is it that, in the age of cyber stalking, identity theft and e-crime, some of us still refuse to practice simple cyber self defense?
It's cold and flu season and, with H1N1 making the rounds again, we are vigilant about keeping our biological systems secure. If only we were as watchful of our information systems...
How many friends do you have? I apparently have 106. I know this because Facebook tells me so. Then, we have my friend Charlie. Facebook tells me that he has 687 friends...
Social Engineering: it's as easy as taking money from sick people. And we are just trusting enough to let it happen again and again...
What if you got an email that looked like it came from your bank's IT admin, asking you to click the link and run an update or verify authentication credentials?
Thank you, street sweepers...sewer cleaner-outers...malware writers....
"Oh...yeah, hi, Uncle Bob...um yeah, Aunt Betty is great...wait....do I even have an Uncle Bob?"
Alternate Title: Get that smug look off your face.
For my first IT job, I was a DB Admin working on a Unix platform. It was back in the days when a wave of worms was going through various Windows products and causing quite a stir, back before most companies had IT Security in their budgets. But there I was, working away on my Unix box, smug in the knowledge that I was safe. Viruses and worms were being deployed to attack Windows vulnerabilities, not Unix.
Do you remember that commercial that came out during last year's SuperBowl? The one for Tide to Go? It has the guy sitting down for an interview, but he has a ridiculous blabbering stain on his otherwise crisp and clean white shirt. If you haven't seen it, you need to stop what you're doing and watch it now. Go ahead, it's SFW.