Social engineering attacks are not as rare as you think. In fact, you might already be a victim “ you just don't know it yet. Social engineering works because people are almost always the weakest link in information security. We sometimes do not think about the things we do, or are in a hurry to double check the links we click on. Other times, we become too confident. Then … [Read more...] about Social Engineering Attacks by the Numbers: Prevalence, Costs, & Impact
attack
How Cyberwar Became the New Normal (and How to Fight It)
In April of 2018, 34 of the world's leading tech and cybersecurity companies banded together on their own volition to sign the Cybersecurity Tech Accord. These companies include Cisco, Microsoft, HP, Facebook, and Nokia. Then, in June, 11 more companies signed on, including Carbon Black, Salesforce, Atlassian, and Gigamon. The reason for the accord is the alarming expansion of … [Read more...] about How Cyberwar Became the New Normal (and How to Fight It)
What to Do During a Ransomware Attack: How to Assess the Damage and Recover Your Files
It's a typical weekday morning. You begin reading emails on your laptop while the coffee brews. One email contains an unexpected business opportunity. The email closes with a request for you to "download the document to view the full proposal." Before you can stop yourself, you click the link ”and immediately a picture like the one above takes over your screen. Nothing can … [Read more...] about What to Do During a Ransomware Attack: How to Assess the Damage and Recover Your Files
Preventing Errors: The Human Factor in Cyber Security
It seems that no matter how advanced cyber security systems get over time, the human factor always remains the greatest liability. When it comes to cyber attacks, most of the time the breach happened due to an employee's misjudgment, carelessness, or simply lack of knowledge. According to a research conducted by BakerHostetler that observed the causes of major security breaches … [Read more...] about Preventing Errors: The Human Factor in Cyber Security
Understanding SDR-Based Attacks on IoT
IoT devices are ubiquitous today. Many of these devices use RF based communication techniques to connect to other devices or to receive commands from remote controls in near field. Many devices like smart tube lights have dual mode operation, in which they connect over the internet for interfacing with a mobile app or via RF with a local remote. RF based communication interface … [Read more...] about Understanding SDR-Based Attacks on IoT