In the past several months the infamous Dyre Banking Trojan has gone silent with security researchers reporting actual new infections dropping to single digits. Researchers suspect that a raid on a…
The $3.6 Million Dollar Ransom – Learn from the Mistakes of Others
The Verge recently published an article, announcing that a Los Angeles hospital was the victim of a data breach using ransomware. In most cases, a ransomware hacker charges several hundred dollars,…
Hospital Becomes Victim of Ransomware Attack
Hollywood Presbyterian Medical Center has become the latest victim of a ransomware attack, causing them to cease normal day-to-day operations. Hackers took the medical center’s system hostage over a…
The Absolute Worst Way to Repair Your Reputation After a Hack
Vtech was hacked in December 2015 by a group claiming they wanted to teach the company a lesson. The “data” gathered in the hack included photos and voice recordings from Vtech devices of 6.4 million…
Top Threats Still the Same - 2015 Verizon Data Breach Report Review
If it ain't broke, don't fix it... Is the most common response I get, whenever I ask IT administrators and executives why they don't patch their systems. The funny thing is that the response is…
Small Businesses Becoming Big Targets
The latest Government Security Breaches Survey found that nearly three-quarters of small organizations reported a security breach in the last year (2015) which is a 13% increase from the 2013 and…
Dyre Circumstances
If you read this blog regularly, you’ve seen a few posts which mention ‘software vulnerabilities’, especially on browsers. We all take browsers for granted and use them every day for social…
Dyre Banking Trojan Explained
Here is a scary scenario for anyone with a bank account and online banking access. You get an email from your bank that says they have detected suspicious activity coming from specific IP addresses…
The Supply Chain Planets Align for a Cyber Security Storm
Transparency Essential One of the techniques seen in the cyber security threat landscape that has been successful for cybercriminals and which results in good pay-outs for them, is using the supply…