26 Aug

Cyber Espionage: The Most Popular Form of Cyber Crime Today

According to Verizon’s 2017 Data Breach Investigations Report, espionage-related cyber attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

read more

Share this
19 Aug

Forget These Cyber Security Myths Right Now

There are 2 myths that stand in the way of boards understanding the threats posed by cyberattacks and ensuring their businesses can be safe against cybercriminals and hackers.

read more

Share this
05 Aug

Even Schools Are at Risk from Cyber Attacks

Recently, Scott County Schools, in Kentucky, fell victim to a $3.7 million fraud phishing scam. According to Superintendent Dr. Kevin Hub, a vendor informed the district that an invoice sent to the district had not been paid. In looking into the matter, the district found that someone else had been paid instead, via a fraudulent email disguised as the vendor.

“This is a process that we use currently in Scott County Schools. It’s a way that we pay our vendors. And it was in this specific case, a single case, that we can verify, and this fraudulent email and fraudulent documentation is what caused this crime to happen.”

read more

Share this
29 Jul

How Real Is Cyber War?

Recently a vulnerability was disclosed that affected millions of Huawei-manufactured laptops. The Chinese manufacturer claimed the vulnerability was a mistake and, in January, patched the affected software. Speculation was rife that this vulnerability might have been injected intentionally with the goal of allowing the Chinese government to exploit it in order to take control of laptops globally at a time of their choosing.

read more

Share this
22 Jul

Beware of Malware in Piracy Streaming Apps

Does the offer to “Never pay for cable again” sound tantalizing?

It shouldn’t. It should sound abhorrent, not only because of piracy is illegal and unfair to content creators, but also because researchers have found that pirated streaming devices are stuffed with malware and/or open the door for it to come streaming in.

read more

Share this
15 Jul

How Threat Detection and Response Technologies Are Integrating

Threat detection and response is difficult and only getting more complicated. According to ESG research, 76% of cybersecurity professionals claim that threat detection and response is more difficult today than it was 2 years ago, so this situation may only get worse in the future.

read more

Share this
01 Jul

Security Weakness Found in VPN Clients

An alert from the Carnegie Mellon University CERT Coordination Center (CERT/CC) has warned that numerous enterprise VPN clients could be vulnerable to a potentially serious security weakness that could be used to spoof access by replaying a user’s session.

read more

Share this
24 Jun

AI & Cyber Security: Which Protects Which?

For people with responsibility for corporate security – everyone from CIOs to CISOs and CROs – AI presents two types of risk that change the nature of their jobs. The first is that criminals, bad state actors, unscrupulous competitors, and inside threats will manipulate their companies’ fledgling AI programs. The second risk is that attackers will use AI in a variety of ways to exploit vulnerabilities in their victims’ defenses. The question remains – which protects which?

read more

Share this
20 May

Malware in Open Source Software

Open Source software is always trustworthy, right? Last year, Bertus broke a story about a malicious Python package called “Colourama”. When used, it secretly installs a VBscript that watches the system clipboard for a Bitcoin address and replaces that address with a hardcoded one. Essentially this plugin attempts to redirects Bitcoin payments to whoever wrote the “colourama” library.

read more

Share this
04 Mar

8 Most Common Cyber Security Threats (Infographic)

If you own a company, no matter how small a company it may be, you are in constant danger of becoming a victim of a cyber attack. It is important to install effective cyber security measures, but in order to do that, you need to know which cyber security threats to prepare for. Here are the 8 most common ones.

read more

Share this

© 2017 Awontis. All rights reserved.