remote access software
Hackers typically sneak remotely into the networks of their victims by setting up phishing scams and duping users into downloading malware-ridden files, which are then executed to commence a cyberattack like ransomware. They may also look for vulnerabilities in computer systems to attempt to get into a network. Both the WannaCry and NotPetya attacks, for example, were successful because hackers used leaked NSA exploits to infect older computer operating systems. Previously, we discussed fileless attacks,
Web Attacks & Trends   , ,
holiday season cybercrimes
It’s that time of year again. With October wrapped up and November in full swing, we are entering into the holiday season where cybercrimes are at an all-time peak. And even if you aren’t purchasing goods and services on the Internet, anyone can still fall victim to cybercrime. Sometimes, however, Internet users may not be aware of the different types of cybercrimes that they may be a potential victim of, which makes it difficult to
Editorial   ,
bug bounty programs
Many people are familiar with bug bounty programs. They are designed to test the security of a company’s computer systems by crowdsourcing talent from all around the world to report bugs, especially those with critical vulnerabilities. In a way, bug bounty programs make the services and software we use much safer, but that’s just on the surface. While the rewards may seem generous ranging from $5,000 for “severe” bugs to $100,000 for discovering an operating
Editorial   ,
payment exchange PCI

November 9, 2017

Top 5 PCI Compliance FAQs

PCI (payment card industry) compliance may not be an expression you hear often as a business owner. However, non-compliance has noteworthy impact to the level of risk your business assumes in payment processing if you accept credit and debit cards from customers as a form of payment. Despite the media headlines that tend to focus on significant data breaches that impact major retailers and government entities — and the millions of customers whose data may
Guest Contributor   , , ,
WordPress security threats and solutions
WordPress is easily one of the most popular web-based platforms on the internet. In fact, over 28% of the viewable internet uses WordPress to host their websites. However, being an open-source platform where anybody can edit anything using CSS code and plugins means there are security risks. At its core, WordPress is the same for every website, meaning that hackers or users with negative intentions will already know their way around your mainframe so, if
Guest Contributor, Web Security Tips   ,
It may seem like the hacking of cash register systems, or POS systems, are a thing of the past, but in reality they are still very much alive today as statistics gathered by the 2017 Data Breach Investigations Report by Verizon have shown that while attacks on POS systems have proportionally gone down, there is still a thriving market for stolen cards. The report reveals that POS attacks made up only 6.7% of the total
Web Attacks & Trends   ,
fileless ransomware encrypted files
Last time on our blog, we explored what made fileless ransomware so different from other malware and how it might just be the new trend within the hacker community. In this guest blog post, we break down how end-to-end fileless attacks occur. Malware makers are always looking for an edge, a new way to breach corporate networks or compromise personal devices. Ransomware is one popular vector — victims find themselves locked out of critical files
Guest Contributor, Web Attacks & Trends   , , ,
cybersecurity policy ncsam
  In an effort to ensure that every user is safer and more secure online, government and industry have come together to promote cybersecurity awareness each year during the month of October to celebrate National Cyber Security Awareness Month. The National Cyber Security Alliance decides on weekly themes throughout the month and this week’s “Cybersecurity in the Workplace Is Everyone’s Business” is an important one. When it comes to cyber attacks, no business—small or big—can
Web Security Tips   ,
spam traps
In the world of email marketing, there are protections put in place to keep individuals safe from spam. These protections are easily avoidable with email marketing best practices, but if you get lazy with your list hygiene, or don’t even know better, you can find yourself in trouble. Enter spam traps and blacklists. Spam Traps Spam traps are usually email addresses that are created not for communication, but rather to hunt Spam. These addresses are
Guest Contributor, Web Security Tips  
strong password paradox online accounts
Recently, a 2003 security report that was included in the National Institute of Standards and Technology (NIST) has resurfaced, bringing about an interesting discussion on strong passwords after one of the original writers, dubbed the “originator of [the] web’s password rules” by Slash Gear, has spoken on the matter. The document highlighted the ways in which a secure and strong password should be chosen based on the following: a mix of capital letters, lowercase letters,
Web Security Tips   ,