Category: Cybersecurity

shutterstock_416374162

Protecting DNS Infrastructure and Minimizing DDoS Attacks

  DNS Denial of Service attacks are popular because they are easy to perform. It doesn't take many resources or advanced skill to bring down unprotected...

Read More >

Stopping Password Reuse: Here’s What You Can Do to Protect Yourself

The news has been rife with incidents of password reuse being exploited by the bad guys. Just as recently as a few weeks ago, hackers...

Read More >

Your Account Credentials Were Sold on the Dark Web… Now What?

By Emilio Iasiello, LookingGlass Cyber Threat Intelligence Group Cyber criminals continue to evolve their operations, seeking more effective ways to exploit and monetize the information...

Read More >

Doxing: An Increasingly Popular Form of Online Harassment

Doxing: An Increasingly Popular Form of Online Harassment

  by Marc Larson and Olga Polishchuk Recently, a hacker released the personal information of 29,000 federal employees – twenty thousand from the Department of...

Read More >

Screen-Shot-2016-03-23-at-2.00.27-PM

Widespread Malspam Campaign Delivering Locky Ransomware

By Steven Weinstein The LookingGlass Cyber Threat Intelligence Group (CTIG) observed a widespread malspam campaign sent to victims appearing as if it had been an...

Read More >

logo

A Costly Reminder: Third Party Risk Management is Critical

We’ve all heard time and time again how important insight into third parties (or the supply chain) is when it comes to an organization’s overall...

Read More >

Blog Speech Bubble

ICYMI: Our Top Cybersecurity Blogs of 2015

  2015 was another landmark year for information and physical security. In case you missed some of the topics we’ve covered on our blog, here’s...

Read More >

pic1

FireStorm: Mitigating the Vulnerability That Can Completely Bypass Firewalls and Exfiltrate Data

A recent discovery by BugSec Group and Cynet (http://www.bugsec.com/news/firestorm/) identified a severe vulnerability in several next generation and application aware firewalls. The vulnerability, code named...

Read More >

banner_web_holiday

‘Tis the Season for Mobile Safety: Safe Mobile Shopping for the Holidays [Infographic]

By Cyveillance A report last month revealed that 51 percent of U.S. online holiday shopping will occur on mobile devices. There are an estimated 184...

Read More >

Video chat

Webcam Hacking: Recent Uptick in IP Camera Trolling Highlights Potential Risks of IP Devices

  By Cyveillance Analyst A new doll from Mattel, the “Hello Barbie,” available in December, demonstrates just how ubiquitous Internet-connected webcams and microphones are becoming....

Read More >

top