POS-point-of-sale-attacks-e1508908656223

Do We Still Have to Worry About POS (Point-of-Sale) Attacks?

It may seem like the hacking of cash register systems, or POS systems, are a thing of the past, but in reality they are still very much alive today as statistics gathered by the 2017 Data Breach Investigations Report by Verizon have shown that while attacks on POS systems have proportionally gone down, there is still a thriving market for stolen cards. The report reveals that POS ...

fileless-ransomware-encrypted-files-e1508812074257

The No-Software Security Breach: How End-to-End Fileless Attacks Happen

Last time on our blog, we explored what made fileless ransomware so different from other malware and how it might just be the new trend within the hacker community. In this guest blog post, we break down how end-to-end fileless attacks occur. Malware makers are always looking for an edge, a new way to breach corporate networks or compromise personal devices. Ransomware is one popu ...

cybersecurity-policy-ncsam-e1508287101917

Three Effective Tips for Achieving a Sound Cybersecurity Policy

In an effort to ensure that every user is safer and more secure online, government and industry have come together to promote cybersecurity awareness each year during the month of October to celebrate National Cyber Security Awareness Month. The National Cyber Security Alliance decides on weekly themes throughout the month and this week’s “Cybersecurity in the Workpla ...

spam-traps-1-e1505454424392

Spam Traps and BlackList Domains and How They Can Affect You

In the world of email marketing, there are protections put in place to keep individuals safe from spam. These protections are easily avoidable with email marketing best practices, but if you get lazy with your list hygiene, or don’t even know better, you can find yourself in trouble. Enter spam traps and blacklists. Spam TrapsSpam traps are usually email addresses that a ...

strong-password-e1503543120167

The Strong Password Paradox

Recently, a 2003 security report that was included in the National Institute of Standards and Technology (NIST) has resurfaced, bringing about an interesting discussion on strong passwords after one of the original writers, dubbed the “originator of web’s password rules” by Slash Gear, has spoken on the matter. The document highlighted the ways in which a secur ...

cloudbric-monthly-security-reports-e1503017857302

Web Security Report Now Provided By Cloudbric

Cloudbric was created for users of all backgrounds, with all types of different websites. You might be an IT-security manager with a large enterprise-level site, or just be starting out and wanting to protect your own personal blog. Regardless, knowing what’s going on within your website is important, and that’s why Cloudbric has recently begun providing Web Security Repo ...

cloud-security-cloudbric-e1502417162414

The Big Three Questions for Cloud Security

The Cloud is a cost-effective option for many businesses. Businesses can store information and run necessary applications on the cloud and only pay for the resources they expend. Unfortunately, this also means the context of security needs has expanded. Through the sharing of hardware, infrastructure, and perhaps even data storage, security in the cloud has become of significant ...

security-patches-in-wordpress-and-others-1

Can Security Patches Backfire?

There are those that purport that updating your Content Management System (CMS) is one of the most basic practices in securing your website, but what happens when hackers “reverse engineer” security patches? According to CMS Garden, which is part of the Secure Websites and Content Management Systems project funded by the German government, hackers can exploit security pat ...

fileless-ransomware-e1501135506473

What Is Fileless Ransomware?

BackgroundRansomware isn’t a new phenomenon. The concept of holding locked files for ransom has been around since the era of the floppy disks. However, many will be surprised to find out that ransomware comes in many forms. Ransomware typically comes in the variants of “locker” ransomware and “MBR” (Master Boot Record) ransomware. Locker ransomware makes a u ...

The-Top-10-Hackers-Arrested-During-2017-e1500513963590

The Top 10 Hackers Arrested in 2017

Cyber criminals are rampant. Active on the dark web, hacking forums, or other platforms that facilitate illegal activities, hackers are utilizing their skills to run effective but illegal black markets. For example, DDoS-for-hire services are quite popular among cybercriminals with willing customers paying as low as $7 an hour to target a company of their choice. These days, cyber cr ...