New Wave of Ransomware Attacks Expected

New Wave of Ransomware Attacks Expected

In the world of information security and cybercrime, hackers are known to chase certain trends. In the mid-1990s, cyber vandalism and defacing websites were actions that hackers engaged in for the purpose of making a name for themselves in the underground. Cracking commercial software and distributing pirated copies gained popularity in the early part of…

Details
2018 Will Be The Year of Malware

2018 Will Be The “Year of Malware”

Providing forecasts of the challenges that lie ahead in the information security landscape has become a New Year’s tradition for experts who work in this field. Over the last few years, Israel has become known as a leading nation in terms of cybersecurity research, and one of the most worrisome forecasts was recently issued by…

Details
How Hackers Can Take Down 40 Websites in Minutes

How Hackers Can Take Down 40 Websites in Minutes

Here’s a situation that underscores the importance of network security these days: a novice hacker working for the research and development department of a Japanese automaker was able to exploit a cross-site scripting vulnerability to infiltrate a server and compromise 40 websites in seven minutes. Method of Attack Used in the Hack The attack started…

Details
Locking Down Sensitive Data in Business Laptops

Locking Down Sensitive Data in Business Laptops

What constitutes sensitive data these days? Due to the increased threat of data breaches, identity theft, and cyber attacks, the definition of sensitive data has been expanded to include just about any type of digital information that is routinely stored in a business laptop. Protecting Private Information on Business Networks From personally identifying information to…

Details
When Subtitles Attack New Cyber Risk in the High Desert

When Subtitles Attack: New Cyber Risk in the High Desert

If you own a business in Victorville, Apple Valley, Hesperia, or elsewhere in the High Desert, you should know that web browsing by your staff is among the most common causes of virus infections, data breaches, and compromised networks. Firewalls and security software can only do so much to keep business networks safe; to prevent…

Details
The Danger of the Leaked NSA and CIA Hacking Tools

The Danger of the Leaked NSA and CIA Hacking Tools

In terms of security, the year 2017 is shaping up to be one of the most challenging and hazardous for users of enterprise networks. From booby-trapped Microsoft Word documents to highly technical leaks of exploits used by United States intelligence and espionage communities, the information security (infosec) threat environment has been at historically elevated levels…

Details
Cloudbleed A Potential Risk for High Desert Business Owners

Cloudbleed: A Potential Risk for High Desert Business Owners

Cloudbleed, the first major internet vulnerability of 2017, was announced by cyber security analysts in mid-February. It took less than two weeks for analysts to determine that this particular problem could affect millions of internet users around the world; in terms of potential damage to High Desert companies, business owners who are Cloudflare clients should…

Details
Avoiding Hefty HIPAA Fines in California

Avoiding Hefty HIPAA Fines in California

The largest fine ever assessed under the Health Insurance Portability and Accountability Act (HIPAA) has sent providers of medical services scrambling to audit their information systems. The Importance of Securing Information Advocate Health Care is a network that operates various hospitals in the Chicago metropolitan area. A single, self-reported incident in 2013 prompted government regulators…

Details
Corporate Espionage and the Danger of Personal Clouds

Corporate Espionage and the Danger of Personal Clouds

Cloud computing has been one of the most significant advances of the ongoing Information Age, and it is bound to keep growing in the next few decades. The widespread adoption of the cloud computing paradigm has resulted in the emergence of personal clouds, a data practice that corporate spies are too willing to exploit. The…

Details