Category: Uncategorized

The Effects of Ransomware on Small and Midsize Businesses

A recent surge of Ransomware attacks on Small to Midsize businesses has caused many enterprises to re-evaluate their disaster recovery and security strategies. The reason these organizations have...

Read more arrow_forward

Phishing Scams and How to Avoid Them

Phishing attacks have become a common occurrence, targeting both individuals and companies. This social engineering tactic used by cybercriminals, takes advantage of human interaction to gather...

Read more arrow_forward

How to improve your organization's security posture

Made up of both technical and non-technical policies and procedures, a security posture is your organization’s overall security plan or the steps your organization takes from planning to...

Read more arrow_forward

Top Responsibilities of a New Chief Information Security Officer (CISO)

As the need for security becomes more prevalent in organizations, the role of a Chief Information Security Officer (CISO) becomes essential for assessing, managing and implementing security measures....

Read more arrow_forward

FFIEC Risk Profile

The growing threat to cybersecurity has prompted the Federal Financial Institutions Examination Council (FFIEC) to develop a Cybersecurity Assessment Tool for banking institutions to assess their...

Read more arrow_forward

Lisa Jiggetts on Women in Cybersecurity

Lisa Jiggetts is the founder and CEO of the Women's Society of Cyberjutsu (WSC), one of the fastest growing nonprofits dedicated to women in cybersecurity.  WSC provides women with the resources and...

Read more arrow_forward

CIS Critical Security Controls

CIS Critical Security Controls specifies and recommends the appropriate actions for organizations to take to improve their critical infrastructure. Although organizations are taking preventative...

Read more arrow_forward

2016 Windows Mitigations

In 2016, Microsoft took several steps to improve and increase security for modern Windows versions in small steps, called mitigations. These mitigations serve as security measures to decrease and...

Read more arrow_forward

2016 Windows Exploitations

Over the course of 2016, vulnerabilities in Internet Explorer and Edge were fixed after numerous exploitations. According to statistics, the number of vulnerabilities exploited from the outside in...

Read more arrow_forward

David Leach Shares His Insight on Investing in Cybersecurity Firms

David Leach is a Principal and Head of Private Equity at The Chertoff Group. In this position, Mr. Leach leads The Chertoff Group’s Private Equity business, which provides growth capital to...

Read more arrow_forward

5 Reasons Why to Join Cybersecurity Conference QuBit 2017 in Prague

Attending a conference is an effective way how to educate yourself, promote your company and meet new partners and fellows. The cybersecurity market offers plenty of opportunities to join various...

Read more arrow_forward

FFIEC Cybersecurity Assessment Tool Maturity Level

The Cybersecurity Assessment Tool or Assessment has been issued by The Federal Financial Institutions Examination Council (FFIEC) for its members. This tool is made for banking institutions is used to...

Read more arrow_forward

Joyce Brocaglia on The Cyber Security School Challenge and Cyber Bullying

 Joyce Brocaglia is the founder and CEO of Alta Associates. Founded in 1986 Alta Associates has become the most prominent boutique executive search firm specializing in Information Security, IT...

Read more arrow_forward

If You Solve It, They Will Come!

Heads up for new entrepreneurs - 3 perspectives of Technology Value vs Market Pain Larry Cole, Cybersecurity Consultant at CyberSecExec, shares his knowledge in solving difficult strategic...

Read more arrow_forward

Fake Software Updates Can Lead To Stolen Keychains On Apple Products

  Recently there has been a small uptick in the occurrences in fake software updates, in particular Adobe Flash Player. These especially have been seen targeting Macbooks and other Apple...

Read more arrow_forward

Tune In To ABC NY To Watch Our CEO Give A Cyber Attack Demo - Monday 10/31 at 5:00 PM ET

Tune in tonight at 5:00 pm for LIFARS’ first interview with ABC! Watch a live demo of Man-in-the-Middle Cyber Attacks and learn about the dangers of public wifi. Ondrej Krehel, CEO & Founder...

Read more arrow_forward

Facebook, Twitter and Instagram Delivered Data Access to a Surveillance Tool Developer

Data from Facebook, Instagram, Twitter, YouTube and Picasa were being harvested by a Chicago startup via a social media monitoring tool, which was then sold to law enforcement agencies for...

Read more arrow_forward

Ben Johnson on Communicating Security

Ben Johnson is the co-founder and chief security strategist for Carbon Black. With a number of years working on U.S. national security missions and writing complex calculation engines for the...

Read more arrow_forward

The Great Data Hunt

By Yoran Sirkis, CEO of Covertix Quick. Just in your head – try to count all the places your corporate data may reside – network, cloud, corporate and private mobile devices, laptops,...

Read more arrow_forward

Brian Donohue on Security Analysis

Brian Donohue is a technology journalist who covered network security for Threatpost before joining Cyber4Sight, Booz Allen Hamilton's cyber threat intelligence unit, as a consultant. Primarily, Brian...

Read more arrow_forward

UK Govt Websites Switch to HTTPS Encryption

Come October, all Government Digital Services (GDS) websites will switch to mandatory HTTPS encryption. Some would say it’s about time too. In a recent blog post, Dafydd Vaughan, technical...

Read more arrow_forward

Lizard Squad Hacks CCTV Cameras to DDoS Bank Websites

  Researchers at a security firm have uncovered a network of thousands of compromised CCTV cameras and webcams controlled by hackers to carry out comprehensive cyberattacks targeting...

Read more arrow_forward

An Online Privacy & Anonymity Guide for a Normal User

In a time where data breaches make headlines every single day, personal and entirely private and sensitive data is at risk. Of the more recent high-profile breaches, the Ashley Madison hack is...

Read more arrow_forward

Hackers Steal $10 Million from Ukrainian Bank

Another day, another SWIFT attack. An independent IT monitoring organization has revealed that an unnamed Ukrainian bank was targeted in a $10 million theft from hackers, using a SWIFT...

Read more arrow_forward

Pentagon Invites Hackers to Hack the Department With Bug Bounty Program

Starting next month, the Pentagon will launch the United States government’s first ever big bounty program to encourage hackers to break into its websites in exchange for cash. Although...

Read more arrow_forward

Turkish Hacker Behind $55 Million Cyber Heist Pleads Guilty

A Turkish hacker who US prosecutors alleged to be the mastermind behind a number of cyber attacks that collectively amounted to nearly $60 million to be siphoned off from ATMs around the world, has...

Read more arrow_forward

Computer Data: Is It Tangible Property & Subject to “Physical Loss or Damage”?

Business policy holders were scratching their collective heads – for the purposes of insurance – to find out if stored data in the form of media, software, or programs are deemed...

Read more arrow_forward

DDoS Attacks Are up 149 Percent Toward End of 2015

Denial of service attacks work by using a network of hijacked computers to flood a site with phony traffic until it breaks. New figures from Akamai’s State of the Internet report has shown...

Read more arrow_forward

Confirmed: Ukraine Power Outage Caused by Cyber Attack

The high profile power outage that struck Ukraine in December, leaving 225,000 people in the dark was the result of a cyber attack, the US Department of Homeland Security confirmed on Thursday....

Read more arrow_forward

Apple CEO Tim Cook Says iPhone Backdoor is Software Cancer

  Staunch pro-encryption advocate Tim Cook, in the midst of a fierce standoff with the FBI and the US government in refusing to build a backdoor for an iPhone belonging to San Bernadino...

Read more arrow_forward

Android Users Downloaded Over 2 Billion Backdoor Apps

An independent security firm has determined that Android users have downloaded over two billion data-stealing Android applications onto their devices. Meanwhile, large numbers of enterprises are also...

Read more arrow_forward

Defense Giant BAE Faces Over 100 ‘Serious’ Cyberattacks Every Year

British multinational BAE Systems, a defense, security and aerospace solutions company has revealed that it is subject to at least two “serious and persistent” cyberattacks every...

Read more arrow_forward

The Rise of LinkedIn Fraud (And How to Avoid Being a Victim)

LinkedIn is among the most popular and profitable social media networks in the world. The platform hosts nearly half a billion users globally, many of whom who pay for subscriptions and features,...

Read more arrow_forward

An Outside Perspective: U.S. Legal System & Cyberstalking

Lavinia Popinceanu is a Canadian via Transylvania in Romania and moved to the United States in 2011 to attend a U.S. graduate program. From a professional standpoint, she has a background as an...

Read more arrow_forward

Android Banking Malware Source Code Leaked

The source code for a powerful Android banking malware program that steals online banking credentials has been leaked, researchers at IBM have confirmed. A malware family that is known by several...

Read more arrow_forward

Android Banking Trojan Xbot Doubles as Ransomware

A new Android malware Trojan that snoops for online banking credentials can also encrypt the Android device’s files in exchange for ransom, researchers have discovered. The malware, called...

Read more arrow_forward

LA Hospital Gives in to Pay $17,000 in Ransomware

The president of the recently targeted Hollywood Presbyterian Medical Center has revealed that his hospital has paid a ransom of $17,000 to regain control of their computer systems following a cyber...

Read more arrow_forward

Instagram Adds Two-Factor Authentication

  It’s a long due move but it’s better late than never. Social network Instagram has confirmed that it will be adding two-factor authentication as a security measure to keep...

Read more arrow_forward

Russian Cyberespionage Group Uses Linux Trojan

A Russian cyberespionage group known as Pawn Storm have been targeting and infecting Linux systems with a simple yet effective Trojan program that does not require highly privileged access. Also...

Read more arrow_forward

Hackers Encrypt Hollywood Hospital's Systems with Ransomware

For nearly a week, the computer systems at Hollywood Presbyterian Memorial Medical Center have been crippled by the work of malicious hackers who are seeking a ransom in exchange for restoring the...

Read more arrow_forward

Brigitte Volochinsky on HIPAA

Brigitte Volochinsky, Esq., CHPC is a healthcare attorney licensed to practice law in New York and New Jersey. Brigitte currently serves as corporate counsel for CarePoint Health, a health care system...

Read more arrow_forward

Toymaker VTech Waves Away Security Responsibilities After Major Breach

Following a comprehensive breach that saw the details of nearly 6.3 million kids stolen, internet-connected toymaker VTech has now revealed a clause in its Terms and Conditions that allows the...

Read more arrow_forward

 The IRS Successfully Stops Hackers

  The IRS has revealed that it successfully denied hackers who attempted to steal taxpayers’ electronic filing PINs. In the lead-up to tax season, the attack is the latest attempt to...

Read more arrow_forward

Microsoft Hastens to Patch Critical Vulnerabilities

In a new security bulletin on the Windows-centric ‘Patch Tuesday’, Microsoft has revealed that all versions of Windows from Windows Vista and later contain a serious flaw that requires an...

Read more arrow_forward

Obama Seeks Increased Funding Against Cyber Threats

  On Tuesday, President Barack Obama sought an increase in funding to directly counter and combat security threats, following a warning by his top intelligence official. The warning noted that...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.