malware

Find Friends and Credit Cards on Facebook: The New Cybercrime Reality

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. With the release of the second…

Ransomware: The New Cyber Kryptonite

And then, there was irony. While Apple has been able to hold out against the FBI demanding it produce a backdoor into the iPhone used in the recent San Bernardino attack, it was unable to render a similar defense against a strain of ransomware that recently, albeit briefly, infected its own Mac computers. The recent…

Hiding in Plain Sight: The Growth of Cybercrime in Social Media

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. Today, we are announcing the release…

Operationalizing Monitoring and Response

There are constant attacks against every network, and security practitioners need to be prepared to defend their organization’s assets. However, while many organizations have technology to detect at least some of these threats, they do not have the resources to effectively follow up or act on what they may find. Over the past few years,…

The CISO White Elephant Party

The holiday season is the storm before the calm. Available time is occupied with getting ready for end-of-quarter / end-of-year, squeezing in meetings before folks depart, shopping, and of course attending white elephant gift exchange parties. These parties are notorious for exchanging absurd gifts that are burdensome, possibly expensive, and serve little purpose. If you’re…

Friendly Fraud and How to Keep Parents Safe Online

I recently read a great blog which discusses a child’s journey through the digital universe.  If you are a parent, especially of a young child, I highly recommend it.  The digital world offers so many amazing opportunities for our children to learn, yet there is certainly a dark side of which we must always be…

Peering into GlassRAT

Today RSA is reporting GlassRAT, a previously undetectable Remote Access Tool (RAT) which was discovered by the RSA Incident Response Team and investigated by RSA Research during an engagement with a multi-national enterprise.   While the malware was not detectable by endpoint antivirus products, RSA Security Analytics was able to identify and alert on its network…

David vs. Goliath

Yes. Yes. You are very good at what you do (even the best!). You have skills, techniques, speed and strength. But is that enough? Just being the best at what you do doesn’t mean you will win against any opponent. Have you ever thought what will happen to a boxer entering the Octagon with an MMA fighter? If…

Another day. Another Ransomware.

TeslaCrypt is a ransomware trojan that targets computers with user data and specific computer games installed. Once the system is infected, the malware searches for various file types related to personal documents and different games, including Call of Duty series,World of Warcraft, Minecraft and World of Tanks, and then encrypts them.  The victim is then prompted with a…

Are Cybersecurity Enhancements Drowning in the New Rec Center?

The trusty Jansport you’ve used for years is dilapidated and it’s time to replace those three ring binders. Paper supplies to fresh bedding are filling up the trunk. Let’s not forget the full size mirror for the back of the door. Mom & Dad are throwing in a jammer RFID card for your wallet, insisting…