threat-intelligence-insights

Cyber Attacks Abound with the Proliferation of New Technology – No Time for Complacency

While new technology and increased Internet access brings with it lots of positive aspects, you ...
threat-intelligence-insights

Anti-Counterfeiting Trade Agreement (ACTA) Explained

Background The proliferation of counterfeit and pirated goods poses considerable challenges for ...
threat-intelligence-insights

My Brand is Safe if I Register the Most Common Domain Variants, Right?

Congratulations! Your company has come up with a brand new widget that's going to change the world, ...
threat-intelligence-insights

Update – How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

The information below is an update to the following blog posting: How Will ICANN’s Newest Domain ...
threat-intelligence-insights

Trends in Text Message Spam: Comments from the Messaging Anti-Abuse Working Group (MAAWG)

As with any network-connected device, mobile phones and the applications they run bring their own ...
threat-intelligence-insights

How Will ICANN’s Newest Domain Name Program Affect Your Company’s Brand?

Internet Corporation for Assigned Names and Numbers (ICANN) has instituted a new generic top-level ...
threat-intelligence-insights

Canadian Online Pharmacy, Meet Mexican Online Pharmacy

This week the Department of Justice announced that Google will forfeit $500M for "allowing online ...
threat-intelligence-insights

RSA Token Vulnerability and One of America’s Most Secret Agencies Invoked in Latest Spear Phishing Attack

A targeted scam or “Spear Phishing” attack making the rounds today invokes the National ...
threat-intelligence-insights

A Five-Point Plan for Social Network Usage

If there’s any message you should take away about utilizing social media in a secure manner, it ...
threat-intelligence-insights

Don’t Let the Social Media “Generation Gap” Expose Your Network

Here’s a true story I like to tell to explain how wide the social media “generation gap” is. ...