Tag Archives: malware

Probably Makes You WannaCry

The WannaCry name belongs to the ransomware program that was launched this past Friday that has already infected close to 1/4 million Microsoft Windows systems across 150 countries, with an asking price of $300 in bitcoin to decrypt your files… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Probably Makes You WannaCry

Today Show: Hacker Hijack

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Today Show: Hacker Hijack

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

Oracle Systems Breached… MICROS Point of Sale Systems’ Customer Portal Breached

Oracle had their computer systems breached and that lead to the compromise of the MICROS customer service portal. The MICROS customer service portal system had traffic going to a server owned/operated by Carbanak. MICROS is owned by Oracle’s retail division. … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Oracle Systems Breached… MICROS Point of Sale Systems’ Customer Portal Breached

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

1/3 of Wendy’s Locations Compromised

1,025 out of the 3,000 Wendy’s locations had malware on their Point-Of-Sale systems. Investigation has uncovered that infection and exfiltration of credit card information (names, numbers, expiration dates) going back to January of 2015. We believe this series of cybersecurity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on 1/3 of Wendy’s Locations Compromised

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

USB Killer… 2.0!

Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Killer… 2.0!

Phishing and Vishing Attacks are Up

With the recent OPM hack… I use hack loosely because of this. A lot of Personally Identifiable Information (PII) was stolen. About 32 million records. The PII consisted of Names, Addresses, Social Security Numbers, Dates of Birth, places one lived … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing and Vishing Attacks are Up

Malachite

Posted in Security Blog | Tagged , , | Comments Off on Malachite