Month: July 2017

  • Israeli hacking firm Ability under SEC investigation, adding to its woes

    At a glance, the private hacking and surveillance industry is rich and getting richer. Yet that industry boom doesn’t mean every company is raking in millions. Read full news article on Cyberscoop  

  • Avoiding the Dark Side of AI-Driven Security Awareness

    Can artificial intelligence bring an end to countless hours of boring, largely ineffective user training? Or will it lead to a surveillance state within our information infrastructures? Read full news article on dark READING  

  • Bad things happen to good people – but you can help stop that

    Criminals exist, and among those who most of us may encounter are more likely to be the flim-flam men and con-artists and their many scams. These smooth-tongued ne’er-do-wells prey on those who are least likely to identify the inconsistencies in the scam’s storyline. Read full news article on Naked Security  

  • PGP Encryption and Decryption With Apache Camel

    1.0 Overview PGP (Pretty Good Privacy) encryption is used for encrypting, signing, and decrypting data like emails, text, files, directories, and whole disk partitions. It also increases the security of email communication and it can be used to authenticate digital certificates. Read full news article on Dzone – Integration  

  • Cat-Phishing Hackers for Fun and Profit

    On June 14th, 2017, a new variant of ZXShell appears to have been uploaded from the Marmara region of Turkey. The Trojan itself is well known and contained x32 and x64 rootkits. Read full news article on The RSA Blog  

  • Google and Apple should do more to fight phone scammers, says researcher

    Technology companies like Google and Apple should be doing more to protect users against phone scammers, says one security researcher. David Glance, the director of the UWA Centre for Software Practice at the University of Western Australia, is all too familiar with the different types of scams that prey on users. Read full news article…

  • ‘NotPetya’ Hackers Demand $256,000 In Bitcoin To Cure Ransomware Victims

    It looks like the hackers responsible for the massive ransomware outbreak that crippled Ukraine last week and infected some of the world’s biggest industrial companies, from Maersk to Merck, are posting messages demanding more Bitcoin to unlock victims’ files. Indeed, they’re after 100 Bitcoin, currently worth an astonishing $256,000. Read full news article on Forbes.com…

  • VMware AirWatch Windows 10 Unified Endpoint Management Reviewer’s Guide

    The VMware AirWatch® 9.1 Enterprise Mobility Management™ capabilities for Windows 10 introduce smarter ways to deploy, control, and manage an organization’s PC fleet. Traditional approaches use multiple administrative tools to manage the PC life cycle. Read full news article on DABCC  

  • The Frightening Fake Kidnapping Call And How To Protect Yourself

    A few Sunday’s ago I received the most frightening phone call I have ever gotten as a parent. I answered to a young persons voice screaming for mom to help. Read full news article on Forbes.com  

  • NeutrinoPoS – Old Trojan Shifts to New Targets

    Next, the malware extracts a command and control (C&C) address list from its body and decodes it (the list is Base64-encoded). Next, the Trojan attempts to connect to a working C&C using a specific algorithm: Read full news article on SecurityWeek  

  • Insider Security Threats

    Great talking to Christy Wyatt, CEO of Dtex Systems to get her insights on the current state of proactive security. Prior to becoming the CEO of Dtex, she was the CEO of Good Technology and oversaw the 2015 acquisition by Blackberry. Read full news article on Dzone  

  • Researchers Dissect Stealthy Backdoor Used by NotPetya Operators

    “It seems very unlikely that attackers could” inject a “very stealthy and cunning backdoor” into one of the software’s legitimate modules “without access to M.E.Doc’s source code,” ESET notes. Read full news article on SecurityWeek