Weekly Executive Summary for Week of June 23, 2017
Nigerian Business Email Compromise Attacks What is it? Over the past several months, researchers at Kaspersky have seen over 500 companies in 50 countries get attacked by Nigerian phishing ...
Weekly Executive Summary for Week of June 23, 2017
Nigerian Business Email Compromise Attacks What is it? Over the past several months, researchers at Kaspersky have seen over 500 companies in 50 countries get attacked by Nigerian phishing ...
Weekly Executive Summary For Week of June 16, 2017
Securing your home router When it comes to home network security, many people do not realize how vulnerable their routers are. Listed below are some ways you can secure your home router. Keep in ...
Weekly Executive Summary For Week of June 9, 2017
Fireball Adware Infects 250 Million What is it? Researchers at Check Point have discovered that Rafotech, a Chinese digital marketing company, has been running a massive adware campaign that has ...
Weekly Executive Summary For Week of June 2, 2017
Cloak and Dagger attack brings another Android weakness to light What is it? The Cloak and Dagger attack is a technique used to gain control of an Android device. It was discovered by a team of ...
Weekly Executive Summary for Week of May 26, 2017
WannaCry What is it? WannaCry is a worldwide ransomware attack that infected more than 300,000 computers. The WannaCry ransomware searches for and encrypts 176 different file types and asked the ...
Weekly Executive Summary for Week of April 21, 2017
Keeping Browsers Updated Mozilla has recently released security updates to address vulnerabilities within Firefox and Firefox ESR. These vulnerabilities would allow attackers to exploit the ...
Weekly Executive Summary for Week of April 14, 2017
Layer 2 Security Best Practices Layered security is the best method in mitigating malicious attacks in a network infrastructure. While there are many aspects in defense in depth, layer 2 ...
Weekly Executive Summary for Week of April 7, 2017
Database Security Securing the back end of any application and/or software is key to ensuring confidentiality, integrity, and availability of the information that is being stored or transported. ...
Weekly Executive Summary for Week of March 17, 2017
Industrial Control Systems Security Best Practices Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are increasingly being targeted by cyber attacks ...
Weekly Executive Summary for Week of March 10, 2017
WordPress Security With the recent vulnerabilities with WordPress, it is always important to ensure that your sites are secure. By following some of the Best Practices provided by WordPress and ...