Published on 07/21/15 09:06AM
Published on 06/25/15 08:29AM
There are many ways a spammer can infect a device with malware and capture confidential or banking information or sell counterfeit drugs, luxury items or software. A few years ago, spammers would register fictitious email accounts with many different webmail services to send spam messages which would capture private information or make victims partake in affiliate scams. As antispam companies became more proficient in identifying unsolicited messages through email domains and IP addresses, spammers began to use more clever techniques. An example is the so-called snowshoe spamming, in which spammers scatter their messages across a wide range of IPs and domains, in order to blur domain reputation metrics and evade filters. Recent years have seen a rise in snowshoe spam, but while this type of spam fits into a pattern, the way it’s executed may vary from one spam wave to another.Read More
Published on 03/19/15 04:00PM
This year’s Mobile World Congress (MWC15) was the biggest yet. With over ninety three thousand attendees from two hundred countries and speakers from all industries touched by the mobile market, the event was abuzz with mobile innovations. But, mind you, the show’s major theme has evolved since its first edition ten years ago. It’s not just about ‘mobile’ anymore. It’s about mobility and all the connected devices that make up the Internet of Things. And we could clearly see a number of trends shaping.Read More
Published on 03/04/15 04:00PM
In POS Security: Lessons for Every Business Employing Such Systems we show how important it is for a retailer or any type of business processing credit card payments to fully understand how POS systems work and the security risks.
In this article, we’ll cover POS attack vectors and ways to detect and even prevent them. There are several ways someone may attack a POS, and we’ll analyze them one by one.
Published on 02/12/15 04:00PM
POS security is one term that we’ve been hearing for more than five years now. And its dark connotations only increased in intensity with the recent Target and Home Depot breaches that shook the two retailers to their core. But it’s not only high-profile retailers that should be wary of such attacks. Smaller companies – retail chains, restaurants and other types of business – in the US, Canada, Australia and Russia have had their POS systems breached in recent months.
So regardless of industry or location, if you have a POS system in place, or you’re considering employing one, you may become a target. To prevent this gloomy perspective, it’s recommended you fully understand how POS systems work, what types there are and the risks they present, as well as the basic security questions you need to ask a potential POS vendor when evaluating their solution.Read More
Published on 01/23/15 03:00PM
2014 will most likely go down in history as the year of major data breaches. Notable companies across various industries had their systems hacked, causing a wake of incalculable damage to their brand and customer loyalty. Some had their customers’ and employees’ personal data compromised, while others had assets exposed to theft and misuse.
According to press reports, the most targeted sector was retail – Home Depot, Target, Neiman Marcus and Michael’s are just a few examples of hacked high-profile retailers. Despite major investments in security, the banking/financial sector was also highly affected by data breaches – the JPMorgan Chase and Korea Credit Bureau hacks are just two cases that made headlines. In contrast, the healthcare sector lags behind in terms of security investments, wide-spread good practices and dedicated IT staff. And the Community Health Services hack showed once again how vulnerable the healthcare industry is to medical data theft.Read More
Published on 01/16/15 03:52PM
Technologies are evolving at a faster pace than ever before. They’re becoming smarter, quicker, wiser. The evolution of the Internet of Things (IoT) and Bring Your Own Device (BYOD) over the past couple of years is a clear sign that we’re becoming more connected with each other, with our homes and offices. And that connectivity becomes seamless, uninterrupted, as more sophisticated wearable devices enable us to stay connected while out and about. But greater connectivity comes with greater security risks. Cybercriminals have shown time and time again how skilled they are at exploiting a variety of interconnected systems and networks. So what about security – how will it evolve with all these welcome-but-risky developments?Read More
Published on 12/30/14 04:00PM
Gartner recently announced its predictions on the number of interconnected devices that will make up the Internet of Things (IoT) in the following years: 25 billion connected devices by 2020. This is a clear sign that technological advancements are moving quickly to make our lives easier. Before we get excited, we should take a look at what this means for the dark side of the IoT: internet-connected devices will also make it easier for bot-masters to seize and control thousands, it if not hundreds of thousands, of “zombies”.Read More
Published on 12/19/14 03:48PM
If you thought the Apple iCloud breach was the biggest security hit on Hollywood this year, you’d be wrong. The recent attack on the film studio Sony Pictures is considered the biggest one yet, as the damage affects not only the company, but also its employees and film collaborators. The attackers, who call themselves the Guardians of Peace #GOP, leaked a treasure trove of internal data: high-quality screening copies of Annie, Fury, Mr. Turner and Still Alice, sales projections for a number of TV shows, company budgets, IT security plans and access credentials, personal information of employees and artists working with Sony, as well as payroll and compensation data. Given the amount of top secret data leaked, the US FBI department has jumped on the investigation, along with the security company that Sony hired to clean up its networks and restore its systems.
Published on 12/02/14 11:07AM
Advanced Persistent Threats (APTs) have been a hot topic for quite some time. In the hype created around it, the media and security specialists have ventured to provide opinions and explanations on various aspects, including what an APT is, and how to protect against it. For example, security vendors offering solutions against APTs often claim that “Traditional signature-based security won't protect you from APTs”. They also explain that they offer “a signature-less, virtualized detection engine", and other modern technologies that protect against APTs. But are they really 100% effective?
And are all these claims valid?Read More