HTML Attachment Phish: What You Need to Know

Posted by Heather McCalley

Wed, Apr 23, '14

Even though this past weekend was a holiday weekend for many, there is a good chance that you still checked your email fairly often.  If you are like me, you typically use your phone or another mobile device to check your email on the go.  This past weekend, you were probably multitasking and may not have been on high-alert for a fraudulent message while you were checking email in between hiding  and finding Easter eggs.

Read More

Topics: Phishing

Cyber Chess: How You Can Win

Posted by Mike Perez

Mon, Apr 21, '14

Most of us are not very good at playing chess – if we play at all.  However, many of us at least have some familiarity with the game. The following quick description will help in the discussion of Cyber Chess – the game the good guys (white pieces) “play” against the cybercriminals (black pieces) as they try to steal anything we value from our cyber world.

The chess game is described in three phases.

Read More

Topics: Cybersecurity

Starbucks Attack: Wake Up with Threat Intelligence

Posted by Malcovery Security

Fri, Apr 18, '14

If you’ve been monitoring cybersecurity news today, you might have seen a story about an email campaign that has been circulating, falsely representing the Starbucks brand. We can also confirm that we’ve been monitoring this activity in the Malcovery Spam Data Mine.

Read More

Topics: Cybersecurity

Phishing & Malicious Spam Trends from Q1 2014

Posted by Malcovery Security

Tue, Apr 15, '14

Cybercriminals had a busy first quarter, increasing speed and efficiency in their activities. This allowed them to kick off the new year with fresh tactics for delivering malicious spam to unsuspecting internet users around the world. 

Read More

Heartbleed Phishing Scams: Protect Your Brand From Phishing Criminals

Posted by Malcovery Security

Fri, Apr 11, '14

If we were to pick one word to summarize this week in tech, it would be Heartbleed. “The ultimate web nightmare,” says Mashable, the Heartbleed vulnerability is unlike anything that we have seen in recent history.

Read More

Topics: Phishing

Why Do We Treat Cybercrime Differently than Real-Life Crime?

Posted by Gary Warner

Tue, Apr 8, '14

 

What would you do if you were the victim of a crime? For example, what if you walk out to your car after work and find the window smashed and the stereo stolen? Wouldn’t you call the police?

Imagine that, this weekend, you’re leaving a bar with some friends. A man walks up, points a gun at you and demands your wallet. You’d call the police, right?

Now pretend you receive an email saying that the bank needs you to reset your password. You go to the provided website in the email and the next time you check your balance there’s $500 missing. Who would you call?

Read More

GameOver Zeus: Three Things You Should Know

Posted by Brendan Griffin

Wed, Apr 2, '14

The Zeus banking trojan is a popular topic in the security world these days. It’s not new, but it still garners attention as one of the most successful and prolific trojans in use today.

Banking trojans hide on infected machines and intercept activity related to the user’s finances—bank account logins, investment information, even purchases on sites like eBay. This differs from phishing in that the user infected with a banking trojan like Zeus is not visiting a fake website. Instead, he or she is interacting with the real banking, investing, or retail websites completing legitimate transactions. However, the victim is being watched. Password entry, sites visited, screenshots of what the victim is viewing—these can all be being monitored. Ultimately, as the user is conducting his or her business online the malware is stealing private information and sharing it with criminals.

Read More

Topics: Malware

Cybercrime Lessons from HBO's True Detective

Posted by Mike Perez

Mon, Mar 31, '14

 

For those who did not follow HBO’s recent hit drama, True Detective, starring Woody Harrelson (as detective Marty" Hart) and Matthew McConaughey (as detective “Rust" Cohle), it was an intense drama about a seventeen-year struggle to break a serial murder case and bring a sadistic criminal to justice. For those who do know all about True Detective, that is not a surprise.

Read More

Cybercrime: What Happens When Nothing Happens?

Posted by Mike Perez

Wed, Mar 26, '14

Unfortunately, Sometimes A Lot!

For years, too many to be sure, we have lived in a world of “techno-faith,” believing that various Anti Virus products, firew

alls, black lists, white lists, whatever color lists you can think of, are hard at work protecting us from the dark side of cyber – the cyber criminals.

While it is certainly true that all the things mentioned above are working hard to protect us, and all those companies have the very best intentions and protective feelings for us – and not just because we pay them, it also is true that we are not being well protected, not really.

Read More

Who’s to Blame for the Target Breach?

Posted by Greg Coticchia

Fri, Mar 14, '14

Why are we still discussing the Target breach in March 2014? In a world where ‘news’ literally lasts minutes---OK maybe hours or in special cases days---here we are still discussing breach that started back in the time frame of November 27-December 15, 2013.

Well let’s start by putting this breach—its importance ---in context. At the RSA Conference, TripWire did a survey that unveiled that the Target breach has a larger impact than Snowden leaks on cybersecurity budgets and executive awareness. That, in and of itself, underscores its significance. In short, it had an impact on business in terms of spending and executives realizing that, yes, it is more than the monetary costs that are actually in the income statement---there are remediation costs, and more importantly, reputational costs. And those costs do indeed dwarf the monetary costs. I speak with security professional every day who dismiss the reputational costs to an organization. Well, ask Target about how that is going. 

Read More

Topics: retail

Subscribe to Email Updates