A City Faces a Malware Attack
A recent malware attack against the city of Detroit points to the necessity of enterprise security in the fight against cybercrime.
Blacklisting – Finite Utility
This entry is part 2 of 3 in the series Identity Context: Defense’s Next Play Part Two: Blacklisting – Finite Utility Malicious actors are ruled by the laws of economics just like everyone else; they have finite resources. If they want to attack many targets, the chances are good that they will reuse their tools [Read More...]
Top 5 Security Practices for Financial Institutions to Defeat Online Identity Attacks
The Bank of England (BoE) recently simulated a major cyber-attack against the British financial system that yielded some disturbing results: many of the UK’s largest financial institutions are unprepared for large-scale online identity-based attacks. More surprisingly, many of them are also uneducated on how to detect and report cyber security breaches. The Telegraph UK reported [Read More...]
Network and Desktop Operating Systems Have Too Much Trust
This entry is part 1 of 3 in the series Identity Context: Defense’s Next Play Part One: Network and Desktop Operating Systems Have Too Much Trust At Black Hat 2012, John Flynn showed a slide with the text, “The kids these days, they’re hacking the system as a whole.” There is a wide assumption that [Read More...]
Playing in the Digital Sandbox: Mobile versus Desktop Security
Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS). We have also seen [Read More...]
Mobile Malware — Will it Expand in 2014?
This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass. More and more enterprises are leveraging mobile to share information, complete transaction or increase business efficiency. In fact, 67 percent of organizations use personal devices at work, and 42 percent of companies surveyed now allow BYOD at the enterprise level. Unfortunately, [Read More...]
Ransomware: This is a Digital Hold Up
Avoiding nefarious CryptoLocker, Reveton malware Imagine this frightening scenario: You attempt to log on to your computer, but instead of seeing the normal login gateway meant for entering credentials, you see a black screen with the words “YOUR COMPUTER HAS BEEN LOCKED.” Next to the words are an intimidating FBI window and a warning that [Read More...]
Why Your Network is Failing to Stop Malware
The network of your enterprise is outfitted with antivirus and firewall software to help safeguard against certain types of malware. This software stops most common strands of malware from entering your system and wreaking havoc on your network and devices. But is it enough? While this type of protection is quite useful for eliminating the [Read More...]
Malvertising and Other Online Mischief
Malvertising — or malicious advertising — is getting a bit more attention as of late. In essence, it’s just another method by which criminals attempt to infect user PCs with some form of malware — albeit a very scary form as it can reach so many users so easily. The important point is that criminals [Read More...]
Bill Conner, KRLD’s David Johnson Discuss Threats, Going Private & Government’s Involvement in Private Security
Entrust President and CEO Bill Conner went to the airwaves to chat with David Johnson, of KRLD AM 1080, for a CEO Spotlight segment. Their discussion focused on three primary topics: the changing threat landscape, risks and challenges of going private and government involvement in private-sector cybersecurity.