Skip to content Skip to footer

Where Hackers Go to Shop for Malware

You might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there: this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar and hackers are willing to pay in order to access your network. As…

Read More

An Organization’s Security Policy

Most organizations have some sort of high level security policy that addresses different types of information, how that information should be handled, and who should be handling it. To expand, this security policy is essentially a set of rules and practices that control network assets, the information within the network, and how this information is…

Read More

How To Spot A Phishing Email

The subject line of the e-mail referenced "your Amazon Account." The body mentioned my credit card and how it had just been "updated." A quick scan of the rest caused temporary alarm. My credit card? I didn't make any changes to my credit card or my Amazon account. Upon closer inspection, I recognized this e-mail for what it…

Read More

Choosing An AntiVirus Solution

There are a lot of factors to take into account when you’re trying to select the best antivirus solution for your needs. With the security of your data, digital identity and financial transactions at stake, it’s worthwhile investing some time in assessing each antivirus product. Furthermore, if you make extensive use of the Internet, email, messaging…

Read More

New Executive Order To Stop Hackers

President Barack Obama is taking aim at "malicious cyber actors" who attempt to profit from digital attacks on US interests. An executive order announced Wednesday authorizes the Secretary of the Treasury, Secretary of State and Attorney General to impose sanctions on cyberattackers hacking into the networks of US companies or government agencies. The White House aims to…

Read More

What You Need To Know About FREAK

A new SSL/TLS vulnerability named “FREAK” was identified by several security researchers, a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted. It’s a threat because FREAK allows an attacker to get between a client and server and view what is intended to be a secure and private communication. The vulnerability is…

Read More

New OpenDNS Features

OpenDNS Security Labs has developed a new way to automatically detect and block sites used to distribute malware almost instantaneously without having to scan them. The approach uses natural language processing and other analytics to detect malicious domains before they can attack by spotting host names that are designed as camouflage. Called NLPRank, it spots…

Read More

Worst Passwords of 2014

Worst Passwords of 2014 List has been released. SplashData has released its annual list of Worst Passwords to hit the Internet in 2014. One would think that with all the reported data breaches from retail giants such as Target and Home Depot, people would be more self-aware about their choice in passwords, but in reviewing…

Read More