TDI Unveils 2017 Incident Response Tips

When you're running a global company, it requires a daily comprehension of highly technical issues (presented by your CISO) coupled with rapid response.  An Incident Response Plan not only provides you with more peace of mind, but it educates non-technical departments about what needs to be addressed in times of emergency. "In a real crisis, which we've seen time and again, the TDI clients who maintain an updated Incident Response Plan will apply the least amount of man hours,... Read More

Hotel Security Breach Alert: What You Need to Know

Hotel Chain Breaches - Watch Your Bank StatementsAttending a conference or traveling over the holidays? Whether you're a government employee, corporate executive or staff or traveling on personal business, more and more hotel customers are being put at risk. The InterContinental Hotels Group (or IHG) has recently reported that it is currently investigating claims of data breaches that have happened within some of its US properties. If you've done business at any of the following locations recently, make sure to watch your bank statements... Read More

Making an Acquisition? Make Sure You Conduct Cyber Due Diligence First

CEO hacks previously owned company, gets caughtIt's a brilliant scheme: sell your company, keep the proprietary data, create a competing organization and then hack into your old company's network. That's what happened when David Kent sold his company, Oilpro for $51 million in 2010. “Instead of relinquishing control of his former company, subject David Kent continued to illegally access data and information from his former business to help benefit a competing business he formed after the sale,” FBI Assistant Director-in-Charge Diego Rodriguez said in... Read More

Social Engineering – Part 2: Imitating a Routine Communication From A Popular Service

SE tactics include using the name of a popular service to trick you into thinking they are safeIf you have ever received a suspicious communication about 'Your Amazon.com Order' when you didn't place an order; or an e-mail from 'your bank' informing you 'There is a problem with your bank account. Please reply with your e-mail and password so we can correct this for you.' You may have been targeted by a Social Engineer. Infiltrating Routine E-mails: This type of Social Engineering is successful because we inherently trust the companies we purchase from and... Read More

Social Engineering – Part 1: Appealing to Your Humanity and Using It Against You

Social Engineering is dangerous if you don't know what to look forSocial Engineering is the practice of manipulating people into providing personal information such as passwords, mother's maiden name, and bank information to be used for malicious purposes. In most cases, this is done by obtaining unauthorized access to someone's account and e-mailing all of their contacts. The Cry For Help: If you are a contact of the person who was hacked, you might receive strange e-mails with Urgent titles: "I was mugged while in Istanbul and am in the hospital.... Read More

Secure Online Ordering: Tips and Tricks to Keep You Safe While Shopping Online – 2 of 2

Seem too good to be true? It is.To continue our previous post, I wanted to address something that floats on the other end of the spectrum: Scams. They are everywhere and especially popular during the Holidays. Here are some things to think about when making your next online purchase:  If the deal seems too good to be true; it is. Having previously worked as a Customer Service Team Lead at a large online retailer; I have seen my fair share of scams. One in particular though... Read More

Secure Online Ordering: Tips and Tricks to Keep You Safe While Shopping Online – 1 of 2

Knowing how to stay secure while online is essential during the Holidays, check out these tipsBecause we're in the holiday season, we're likely shopping online at a fever's pitch to get every last present we need at the best deals possible. Cyber scammers know this and will take advantage of unsuspecting shoppers at every chance they get. However, you can protect yourself by using a combination of the following tips and tricks:  1. Look at the address bar at the top of your browser and compare to the following example: Read More

Yahoo Data Breach: An In-Depth Look at the Hacker’s Methods

Hackers have several methods of obtaining your informationIn a previous post, we talked about the now infamous Yahoo data breach and how you improve your level of security. Now, I'm going to attempt to dive deeper into how this infiltration happened. According to Yahoo's Tumblr account, the attackers accessed their proprietary coding and learned to create 'forged cookies' which allowed them to access accounts without typing in a password. What Methods Do Hackers Use to Pilfer Information? The explanation here is more complex than... Read More

Breach Count Rises: One Billion Yahoo Accounts Now Compromised

Yahoo breach count rises to one billionYahoo continues to fail its customers -starting when its user data was hacked about three years ago. When another devastating breach was reported on September 22nd, 2016, impacting 500 million accounts, it was later estimated to reach a billion.  Here are some Cybersecurity Best Practices for Yahoo users (and great advice for any other account you own): If you have a Yahoo account, you should automatically assume that your information has already been compromised and should take the steps... Read More

News: USC Grad Student implicated in DDoS attack

breaking news in the cybersecurity worldSean Sharma, a graduate student at the University of Southern California, launched several DDoS attacks on a San Franciscan chat company by the name of "Chatango". Using a Linux-based stress tester (known as 'Xtreme Fire'), he launched several different attacks between November 2014 to January 2015. The X-treme Fire tool Sharma used is actually meant to be used ethically; to stress test websites for heavy loads of traffic, as in the launch of a new... Read More

  • 1
  • 2

nSights Report


X

nSights Report


X