The Evolution of Cybersecurity Incidents and Incident Prevention: Part 1

Phone 'Phreaking'Recently, it has become commonplace to witness major data breaches and DDoS attacks hitting large companies; like Microsoft.  From hacker groups such as 'The Lizard Squad' and "Hacktivists" like Anonymous. Although it may seem like these attacks came out of nowhere, hacking dates back to the 70's; even prior to computers becoming a household item. 1970's - Phreaking Phreaking was the act of using a plastic toy whistle (from boxes of Cap'n Crunch) to produce a 2600 hertz... Read More

Don’t Fall Victim to Phishing E-mails During the Holidays

Don't let scammers ruin your holidaysWe've all heard the age old adage "If it seems too good to be true, it probably is". In the days of online everything, we should assume this to always be true. One scam that will likely show up on your radar: the attempt to mimic large online retailers. For example, if you're a customer of Amazon.com (and sometimes, even if you aren't) you'll see e-mails like "Your Order Confirmation: Order ID 123-456789-123456, has been shipped". Here are... Read More

Incident Prevention Guidelines: What Your Company Needs To Know

When there's a major incident, such as the Target data breach, we all tend to clutch our wallets a bit tighter. If the appropriate actions aren't taken to respond, or if the prevention techniques weren't up to par, the compromised company may be required to pay punitive damages. Here are the main areas of focus to determine a company's ability to prevent such intrusions: Know How Vulnerable You Are: The company's leadership needs to have a method for... Read More

Ransomware Attack: San Francisco Municipal Transportation Agency

SFMTA Caught RansomwareWhat is Ransomware? Ransomware is a piece of malware that will attack/lock your files, and display a ransom note asking for large amounts money. If you don't provide payment, your data will likely be destroyed. If you shudder when you hear 'Cryptowall' or 'Cryptolocker', then you probably know a lot about this type of scheme. The Ransom: On Friday the 25th; The San Francisco Municipal Transportation Agency was surprised to see the message "You Hacked, ALL Data Encrypted"... Read More

Mobile Device Security: What App Permissions Really Mean

Permission Needed[caption id="attachment_73" align="alignright" width="300"]Permission Needed iOS standard permission box[/caption] Due to the ever-growing population of smartphone and tablet users; mobile applications are now integrated into our daily lives. Sometimes when visiting our favorite websites, take Pinterest for example, we are immediately prompted to download an application from the Appstore. Without a second thought, we'll tap through the installation process so we can view our content uninhibited. Therein lies the problem. App permissions and... Read More

UberCENTRAL Tool Uses Exploitable Code to Recover User Data

UberCENTRAL mobileAbout the UberCENTRAL tool: For those who are unaware, the UberCENTRAL tool is a dashboard is an all-in-one dashboard where you can manage multiple Uber Accounts by tracking individual locations, arrival times, and schedule future pickups. This is handy to businesses who are motoring their customers around and footing the bill, or for scheduling rides for those who do not own smartphones (likely family members and friends). Detailed Discovery of the Flaw: A user by the name of... Read More

What does the term “Cyber Security Incident” refer to?

Secured DataNormally when we think of the term 'Cyber Security Incident', we envision groups of hackers breaking into government databases to steal private information. While this is something that has happened, there are multiple ways incidents can occur; in both our Digital and Physical worlds.' According to OpenEI.org, a Cyber Security Incident refers to: "Any malicious act, or suspicious event, that: Compromises, or was an attempt to compromise, the Electronic Security Perimeter or Physical Security Perimeter of... Read More

2 Events in Modern History That Taught Us the Importance of Checking Software

Almost everything we touch is heavily reliant on computers doing the tasks they were programmed to do. Past events, however, have shown us what can go wrong when the smallest things are overlooked or ignored. While computers are always blamed, there is no doubt that a touch of human carelessness is at fault too.

Microsoft wrongly accuses customers

King of home office software, Microsoft programmers accidently inserted a glitch into their anti-piracy checkers. This all happened back in 2007 and... Read More

Holiday Hacking: From the Gas Pump to the Grocery Store

masked man using gas pumpLast August, a gas station compliance officer with the Virginia Weights and Measures Office conducted a routine check on a pump station in Vienna, Va. He found a skimming device and immediately reported it to the police. Unfortunately, not all gas stations catch skimmers right away. Here are a few things you can do to protect yourself from skimming. Don't Pay with Your Debit Card Since credit cards have been around since the 1970’s, hackers have created... Read More

The International Conference on Innovations in Intelligent Systems and Computing Technologies 2017

The International Conference on Innovations in Intelligent Systems and Computing Technologies will be held next February 2017 in Las Pinas in the Philippines. It was created to enable researchers to build connections between different digital applications. It offers all attendees the opportunities to discover the latest advances in Intelligent Systems, Computing Technologies, Information Technology, Computer, Computing, Semantic Web and Information Management at this key Conference.

There’s a lot more on offer too

While organizers have yet to set a... Read More

  • 1
  • 2

nSights Report


X

nSights Report


X