By:

How Does Ransomware Work? Part 1

July 6th, 2015

Let’s take a look at how ransomware works. In some stages of the operational cycle ransomware runs much like any other malware which may find its way onto your systems. In other stages ransomware has introduced completely new areas of operating for cybercriminals. The first few stages of the ransomware cycle use the tried-and-true methods cybercriminals […]



By: - Dir. Solutions Marketing

Infosec Haiku

July 5th, 2015

Anata no joho sekyuritei konshu no haiku Angler EK – Now with Cryptowall 3.0 and New Evasions!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, I’ll […]



By: - Dir. Solutions Marketing

Infosec Haiku

June 27th, 2015

Anata no joho sekyuritei konshu no haiku Middle Management: Easy Prey for Phishing Scams – Think Before You Click!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … […]



By: - Independent Computer Security Analyst

@gcluley

Mystery surrounds “hack” that grounded 1400 air passengers – Updated

June 23rd, 2015

1400 passengers are stranded at Poland’s busiest airport after what the airline describes as an “IT attack”.

But what actually happened in shrouded in mystery.



By:

Ransomware – To Pay or Not To Pay?

June 22nd, 2015

Let me paint a scene for you. You’re sitting at your desk between meetings. You’re working on a PowerPoint for a customer meeting tomorrow, and you’re waiting for an email back from a co-worker. You have another meeting in an hour, which gives you just enough time to hone this presentation. It’s been 15 well-crafted […]



By: - Dir. Solutions Marketing

Infosec Haiku

June 20th, 2015

Anata no joho sekyuritei konshu no haiku Zero-Day Exploit Means OS X / iOS Passwords at Risk Now!   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if […]



By: - Independent Computer Security Analyst

@gcluley

LinkedIn trumpets the success of its private bug bounty

June 19th, 2015

It’s all very well having a bug bounty program, argues LinkedIn, but how is your organisation going to cope if it is bombarded with hundreds of meaningless and useless reports, that your security team cannot act upon?



By: - Dir. Solutions Marketing

Infosec Haiku

June 17th, 2015

Anata no joho sekyuritei konshu no haiku Cardinals v Astros – Moneyball Databases Need Protection Too!   ### Notes ### * The Infosec Haiku has been on travel, so apologies for the inconsistent posts of late. * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch […]



By: - Independent Computer Security Analyst

@gcluley

Don’t let the LastPass hack destroy your faith in password managers

June 16th, 2015

The LastPass hack may rattle some people’s faith in password managers, but the truth is that they’re a heck of a lot safer than the alternative. Relying on humans to manage multiple passwords has almost always proved to be a disaster.



By:

Ransomware Is the New Kidnapping

June 15th, 2015

In the pre-internet days, ransoms typically involved only prominent, wealthy people and their families. Kidnapping people for ransom is mostly a thing of the past nowadays. It’s an old-fashioned crime. You can’t really get away with it anymore. Kidnapping files, however, is rapidly becoming more popular. Intel/McAfee reports a 155% rise in ransomware in Q4 […]



By: - Independent Computer Security Analyst

@gcluley

All US .gov websites ordered to be HTTPS-only by the end of next year

June 10th, 2015

Good news for privacy.

The US government’s CIO has officially announced that all .gov websites must be only available via encrypted HTTPS connections by the end of 2016.



By: - Director, Product Management

@russbernst

Time to Patch … Tuesday for June

June 9th, 2015

This June Patch Tuesday we have a slightly smaller patch load from Microsoft, taking us back to more historic average releases of 8 bulletins. We have just 2 critical patches to deal with and 6 important. While this is good news for those that have their sights set on some summer vacation, this release also […]



By:

Ransomware 101

June 8th, 2015

This is the first in a series of posts about ransomware. In this post and over the next several weeks I’ll discuss what ransomware is, who the victims are, give some details on a couple of specific types, how to protect your organization, and what to do when your systems have been taken captive. You’ve […]



By:

You May Already Know Your Next Hacker

June 1st, 2015

Over the last couple of weeks I’ve seen a pattern of companies frustrating an individual to the point where the person gives up trying to communicate with the company and hacks them in a major way instead. I guess you could call it Revenge Hacking. In each case, the company was communicating with the person […]



By: - Dir. Solutions Marketing

Infosec Haiku

May 30th, 2015

Anata no joho sekyuritei konshu no haiku Spicy links to see Mouse clicks promiscuously Failed Integrity   ### Notes ### * This week’s haiku courtesy of Mr. Sean M. Price. * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours […]



IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com