Month: January 2018
-
Lazarus Group, Sofacy Most Active Criminal Groups in 2017
The busiest cybercriminal groups of 2017 were Sofacy (otherwise known as Fancy Bear of APT28) and the Lazarus Group, security experts …
-
Lizard Squad is alive and continuing activities as BigBotPein: Report
: “Despite the courageous efforts of our law enforcement agencies to identify and tear down various hacking groups, the collaboration …
-
Who’s Responsible for Security in AWS?
If you haven’t read over the AWS shared responsibility model for security yet, I strongly suggest you do so now. While some people still …
-
Ransomware Scammers Get Scammed Themselves By Tor Proxy Hack
Ransomware is some of the most devious and frustrating malware floating around the internet. These programs lock up your files with …
-
Paladin Armor Seeks To Redefine Smart Home Security
What does this all mean in a practical sense? Take the Ring doorbell for example, one of the most popular and high-volume home security …
-
Considering Crowdfunding? 16 Ways You Can Fight Back Against Copycats
There are enormous benefits to running a crowdfunding campaign, including less risk, no equity, exposure, ease of use, validation, free …
-
Off-The-Shelf Hacker: The Next Wave of Maker Tools for Students
Over the years, I’ve actively sought opportunities to get different perspectives on things. So, each January I visit the Future of …
-
Cybersecurity Pioneers: Discovering Government’s Threat Hunters
Cybersecurity Pioneers: Discovering Government’s Threat Hunters Splunk • January 31, 2018 Twitter Facebook LinkedIn Credit Eligible …
-
Cisco Reveals the Economics of Cryptocurrency Mining Attacks
Unauthorized cryptocurrency mining attacks, sometimes referred to as “cryptojacking” have become an all too common occurrence in recent …
-
Is your cloud service provider ready for HIPAA?
With so many business sectors moving to the cloud we have to stop and ask: is your industry’s compliance framework covered in the …
-
Passwords: 4 Biometric Tokens and How They Can Be Beaten
Passwords present many security concerns. Users still choose short and obvious passwords or use the same ones across all their …
●●●