OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David TannenbaumOFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR... BLOG Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... What is Access Control? May 11, 2020 Data confidentiality, availability, controllability and integrity are the main research contents of data security technology. The theoretical basis of data... Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set... Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are... Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash... Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign... Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero... What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... LIFARS Q and A Session with Cybersecurity Expert Keith Bowie March 19, 2020 LIFARS recently met with Keith Bowie, a cybersecurity professional with a prestigious career spanning over thirty years. Some of his... What are Managed Security Services? March 17, 2020 Third-party providers offer Managed Security Services for the oversight and administration of a company’s security processes. Managed security service providers... Q&A Session with Herb Weisbaum July 16, 2018 Herb Weisbaum is an Emmy award-winning journalist and one of America’s top consumer experts. Weisbaum covers the consumer beat for... Lisa Bock on A New Twist on Ransomware – Internal DDoS June 15, 2017 Lisa Bock is an associate professor of information technology at Pennsylvania College of Technology (www.pct.edu) in Williamsport, Pennsylvania. She has taught...
OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David TannenbaumOFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR...
BLOG Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... What is Access Control? May 11, 2020 Data confidentiality, availability, controllability and integrity are the main research contents of data security technology. The theoretical basis of data... Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which... What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology... Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it... Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set... Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are... Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash... Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign... Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero... What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress... LIFARS Q and A Session with Cybersecurity Expert Keith Bowie March 19, 2020 LIFARS recently met with Keith Bowie, a cybersecurity professional with a prestigious career spanning over thirty years. Some of his... What are Managed Security Services? March 17, 2020 Third-party providers offer Managed Security Services for the oversight and administration of a company’s security processes. Managed security service providers... Q&A Session with Herb Weisbaum July 16, 2018 Herb Weisbaum is an Emmy award-winning journalist and one of America’s top consumer experts. Weisbaum covers the consumer beat for... Lisa Bock on A New Twist on Ransomware – Internal DDoS June 15, 2017 Lisa Bock is an associate professor of information technology at Pennsylvania College of Technology (www.pct.edu) in Williamsport, Pennsylvania. She has taught...
Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
What is Access Control? May 11, 2020 Data confidentiality, availability, controllability and integrity are the main research contents of data security technology. The theoretical basis of data...
Business Continuity Planning May 5, 2020 Disasters are those interruptions that cause the system’s critical information resources to be unavailable for a period of time, which...
What are Technology Controls? April 22, 2020 Technology controls can also be known as a procedure or policy that provides a reasonable assurance that the information technology...
Top 10 Most Dangerous Cyber Viruses of All Time April 22, 2020 Top Destructive Cyber Viruses and How to Avoid Them. 1. CryptoLocker. CryptoLocker Ransomware was released in September 2013 and it...
Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set...
Dutch Police Took Down 15 DDoS-For-Hire Services April 15, 2020 Although Europol closed down several DDoS services in cooperation with the Dutch police last year, it seems that there are...
Small Business Owners Should Watch Out the PII Exposure While Applying for COVID-19 Relief April 7, 2020 A survey of U.S. small businesses showed that 43% of companies said that if they could not obtain rapid cash...
Proofpoint and Microsoft Office 365 Fail in Latest COVID-19 Phishing Campaign April 2, 2020 Proofpoint and Microsoft Office 365 advanced threat protections (ATPs) are considered as top email protection though, an effective spoofing campaign...
Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero...
What is The EARN IT Act? March 23, 2020 The crime of child sexual assault has always been a problem that society hopes to combat. Recently, the US Congress...
LIFARS Q and A Session with Cybersecurity Expert Keith Bowie March 19, 2020 LIFARS recently met with Keith Bowie, a cybersecurity professional with a prestigious career spanning over thirty years. Some of his...
What are Managed Security Services? March 17, 2020 Third-party providers offer Managed Security Services for the oversight and administration of a company’s security processes. Managed security service providers...
Q&A Session with Herb Weisbaum July 16, 2018 Herb Weisbaum is an Emmy award-winning journalist and one of America’s top consumer experts. Weisbaum covers the consumer beat for...
Lisa Bock on A New Twist on Ransomware – Internal DDoS June 15, 2017 Lisa Bock is an associate professor of information technology at Pennsylvania College of Technology (www.pct.edu) in Williamsport, Pennsylvania. She has taught...