Posted January 4, 2016
2015 was another landmark year for information and physical security. In case you missed some of the topics we’ve covered on our blog, here’s a look back at our top cybersecurity blogs from 2015.
What does your Out of Office reply reveal? You might be surprised. As the guy who sends out the marketing emails at Cyveillance (yes, I’m THAT guy) I see a lot of Out of Office reply auto-responders in any given month. With the RSA Conference coming up, and awaiting my barrage of Out of Office emails, I think now is the perfect time to discuss this seemingly innocuous topic.
Although phishing has been around for many years, a surprising 23 percent of phishing email recipients will still open messages, and 11 percent will click on attachments, according to the 2015 Verizon Data Breach Incident Report. Since phishing is still one of the most prevalent security issues, today’s educational post provides a high-level overview of phishing, why it still works, and how you can avoid falling victim to these scams.
Despite spending millions of dollars on state-of-the-art perimeter and end-point security controls, determined actors are still finding their way inside company networks every day by exploiting the human factor. While bad actors have many techniques for attacks at their disposal, social engineering is still one of the most effective means of compromise. In fact, recent security studies suggest that just one percent of employees are responsible for 75 percent of enterprise security risks.
Compromised personal data, criminal services, drug and weapons markets, and illegal pornography are all part of the network of hidden sites now commonly referred to as the “Dark Web,” also known as the “Dark Net” (or “Darknet”). The term conveys not only the secrecy of how this underground channel operates, but also the illicit content often exchanged and sold within it.
A new doll from Mattel, the “Hello Barbie,” available in December, demonstrates just how ubiquitous Internet-connected webcams and microphones are becoming. At the push of a button, the doll records whatever a child says and sends it via Wi-Fi to the cloud, resulting in a computer-generated response that offers the illusion of an actual conversation.