Threat Intelligence Blog

Posted January 4, 2016

 

ThinkstockPhotos-450247361-compressed

2015 was another landmark year for information and physical security. In case you missed some of the topics we’ve covered on our blog, here’s a look back at our top cybersecurity blogs from 2015.

Threats From Within: The Out of Office Reply

What does your Out of Office reply reveal? You might be surprised. As the guy who sends out the marketing emails at Cyveillance (yes, I’m THAT guy) I see a lot of Out of Office reply auto-responders in any given month. With the RSA Conference coming up, and awaiting my barrage of Out of Office emails, I think now is the perfect time to discuss this seemingly innocuous topic.

One Phish, Two Phish, Bad Phish: Don’t Click!

Although phishing has been around for many years, a surprising 23 percent of phishing email recipients will still open messages, and 11 percent will click on attachments, according to the 2015 Verizon Data Breach Incident Report. Since phishing is still one of the most prevalent security issues, today’s educational post provides a high-level overview of phishing, why it still works, and how you can avoid falling victim to these scams.

How to NOT be a Victim of Social Engineering [Infographic]

Despite spending millions of dollars on state-of-the-art perimeter and end-point security controls, determined actors are still finding their way inside company networks every day by exploiting the human factor. While bad actors have many techniques for attacks at their disposal, social engineering is still one of the most effective means of compromise. In fact, recent security studies suggest that just one percent of employees are responsible for 75 percent of enterprise security risks.

A Tangled Web: Exploring the World of the Dark Web [Infographic]

Compromised personal data, criminal services, drug and weapons markets, and illegal pornography are all part of the network of hidden sites now commonly referred to as the “Dark Web,” also known as the  “Dark Net” (or “Darknet”). The term conveys not only the secrecy of how this underground channel operates, but also the illicit content often exchanged and sold within it.

Webcam Hacking: Recent Uptick in IP Camera Trolling Highlights Potential Risks of IP Devices

A new doll from Mattel, the “Hello Barbie,” available in December, demonstrates just how ubiquitous Internet-connected webcams and microphones are becoming. At the push of a button, the doll records whatever a child says and sends it via Wi-Fi to the cloud, resulting in a computer-generated response that offers the illusion of an actual conversation.

Additional Posts

Cyveillance Weekly Phishing Report – January 4, 2016

  Phishing Report: Top Targets Week of December 27, 2015 - January 2, 2016 Author: Robert ...

Integrating DNS Defense and Intelligence Driven Security

Over 90 percent of DDoS attacks target the DNS and the Internet DNS servers which can result in ...