TDI Unveils 2017 Incident Response Tips

When you're running a global company, it requires a daily comprehension of highly technical issues (presented by your CISO) coupled with rapid response.  An Incident Response Plan not only provides you with more peace of mind, but it educates non-technical departments about what needs to be addressed in times of emergency. "In a real crisis, which we've seen time and again, the TDI clients who maintain an updated Incident Response Plan will apply the least amount of man hours,... Read More

Hotel Security Breach Alert: What You Need to Know

Hotel Chain Breaches - Watch Your Bank StatementsAttending a conference or traveling over the holidays? Whether you're a government employee, corporate executive or staff or traveling on personal business, more and more hotel customers are being put at risk. The InterContinental Hotels Group (or IHG) has recently reported that it is currently investigating claims of data breaches that have happened within some of its US properties. If you've done business at any of the following locations recently, make sure to watch your bank statements... Read More

Social Engineering – Part 2: Imitating a Routine Communication From A Popular Service

SE tactics include using the name of a popular service to trick you into thinking they are safeIf you have ever received a suspicious communication about 'Your Amazon.com Order' when you didn't place an order; or an e-mail from 'your bank' informing you 'There is a problem with your bank account. Please reply with your e-mail and password so we can correct this for you.' You may have been targeted by a Social Engineer. Infiltrating Routine E-mails: This type of Social Engineering is successful because we inherently trust the companies we purchase from and... Read More

Social Engineering – Part 1: Appealing to Your Humanity and Using It Against You

Social Engineering is dangerous if you don't know what to look forSocial Engineering is the practice of manipulating people into providing personal information such as passwords, mother's maiden name, and bank information to be used for malicious purposes. In most cases, this is done by obtaining unauthorized access to someone's account and e-mailing all of their contacts. The Cry For Help: If you are a contact of the person who was hacked, you might receive strange e-mails with Urgent titles: "I was mugged while in Istanbul and am in the hospital.... Read More

Secure Online Ordering: Tips and Tricks to Keep You Safe While Shopping Online – 1 of 2

Knowing how to stay secure while online is essential during the Holidays, check out these tipsBecause we're in the holiday season, we're likely shopping online at a fever's pitch to get every last present we need at the best deals possible. Cyber scammers know this and will take advantage of unsuspecting shoppers at every chance they get. However, you can protect yourself by using a combination of the following tips and tricks:  1. Look at the address bar at the top of your browser and compare to the following example: Read More

Breach Count Rises: One Billion Yahoo Accounts Now Compromised

Yahoo breach count rises to one billionYahoo continues to fail its customers -starting when its user data was hacked about three years ago. When another devastating breach was reported on September 22nd, 2016, impacting 500 million accounts, it was later estimated to reach a billion.  Here are some Cybersecurity Best Practices for Yahoo users (and great advice for any other account you own): If you have a Yahoo account, you should automatically assume that your information has already been compromised and should take the steps... Read More

News: USC Grad Student implicated in DDoS attack

breaking news in the cybersecurity worldSean Sharma, a graduate student at the University of Southern California, launched several DDoS attacks on a San Franciscan chat company by the name of "Chatango". Using a Linux-based stress tester (known as 'Xtreme Fire'), he launched several different attacks between November 2014 to January 2015. The X-treme Fire tool Sharma used is actually meant to be used ethically; to stress test websites for heavy loads of traffic, as in the launch of a new... Read More

Public/Hotel WiFi: Defend Against the Public LAN Sharks

Public WiFiThere are a staggering number of businesses that offer free Wifi. For me, this has always been an attractive option when deciding where to eat, or hang out. However, the appeal of the free and easy access can also draw those who have more malicious purposes. Here are a few things you'll want to keep in mind before partaking: Sharing is not caring: Make sure your 'Sharing' settings are turned off. Here's a quick walkthrough on YouTube about... Read More

Malware is everywhere; even in image files.

"ImageGate"Check Point, a cyber-security company with the industry's highest catch rate, has recently detected a new penetration method for malware: image files. Ability to Spread Quickly:  Going by the name of 'ImageGate'; social media sites like Facebook and LinkedIn can be attributed to spreading this virus, as images with the malicious code are easily shared. The designers of the virus have found an exploit in the social media infrastructure allowing them to force the download of an... Read More

The Evolution of Cybersecurity Incidents and Incident Prevention: Part 1

Phone 'Phreaking'Recently, it has become commonplace to witness major data breaches and DDoS attacks hitting large companies; like Microsoft.  From hacker groups such as 'The Lizard Squad' and "Hacktivists" like Anonymous. Although it may seem like these attacks came out of nowhere, hacking dates back to the 70's; even prior to computers becoming a household item. 1970's - Phreaking Phreaking was the act of using a plastic toy whistle (from boxes of Cap'n Crunch) to produce a 2600 hertz... Read More

nSights Report


X