What You Should Know About “Stalkerware”

What You Should Know About “Stalkerware”

Similar to fashion, music and political sentiment, cybercrime tends to follow certain trends. When widespread computer virus infections were first reported in the mid-1980s, hackers were mostly interested in replicating their malware creations as much as possible; in many cases, the malicious code of this era was not even very harmful. Cyber vandalism and boot…

Details
Can a Computer Virus Become Smarter

Can a Computer Virus Become Smarter?

Malicious software, also known as malware, has become as ubiquitous as the computing devices that we use on a daily basis. There is no question that malware tends to be as sophisticated as its intended targets, but security researchers are now concerned about a new breed of malware that could attack smart software such as…

Details
Detecting Keyloggers and Espionage Software

Detecting Keyloggers and Espionage Software

Did you know that there is a thriving industry that caters to people who enjoy surreptitiously spying on others? Spy shops that sell telescopes, hidden cameras, voice recorders, and other surveillance devices tend to do brisk business, and there is also a software side to this industry. What Can Spying Software Do? Spy software, not…

Details
Why Cybercrime Groups Become More Active During the Holidays

Why Cybercrime Groups Become More Active During the Holidays

Less than two weeks before Christmas, Mayor LaToya Cantrell of New Orleans declared a state of emergency after she was informed of a major cyberattack on the city’s networks. Following the advice of IT security managers, Mayor Cantrell ordered an immediate shutdown of municipal data centers, servers, hybrid cloud networks, and even internet-connected client devices.…

Details
Real-World Network Security Testing for Business Owners

Real-World Network Security Testing for Business Owners

The fourth and final season of “Mr. Robot,” the gritty techno-thriller series broadcast on the USA cable television network, will come to an end in the next few months, and it will likely be remembered for its highly realistic portrayal of cybercrime. The production team behind “Mr. Robot” insisted on making hacking scenes, which ranged…

Details
Lessons from the 2019 Baltimore Ransomware Attack

Lessons from the 2019 Baltimore Ransomware Attack

On May 7, various networks operated by the City of Baltimore were subject to a ransomware attack that resulted in a loss of more than $18 million. Municipal services in this large American metropolis were substantially crippled by the attack over several weeks; the City Council ordered employees to set up temporary Gmail accounts, but…

Details
E-commerce Business Owners Should be Vigilant During the Holidays

E-commerce Business Owners Should be Vigilant During the Holidays

Even though Black Friday and Cyber Monday are generally known as the busiest shopping days of the year, a heavy online retail activity is expected to continue throughout Decembers, and this translates into a greater potential for cybercrime. Data breaches and network intrusion attacks are often launched against e-commerce websites during the holidays, and this…

Details
Understanding HIPAA Server Compliance

Understanding HIPAA Server Compliance

One of the main goals of the Health Insurance Portability and Accountability Act is to protect the privacy and integrity of patient health information, particularly when it is handled in electronic formats. Business entities that deal with protected health information in the United States are expected to comply with certain HIPAA guidelines, and this goes…

Details
Understanding the Cyber Kill Chain Used by Hackers

Understanding the Cyber Kill Chain Used by Hackers

Information security researchers who study the actions and behavior of sophisticated hackers use the term “cyber kill chain” to describe some of the strategies used in modern cybercrime. To a certain extent, the cyber kill chain is similar to strategies used by military units and career thieves who take pride on pulling off complex heights.…

Details
2018 Will Be The Year of Malware

2018 Will Be The “Year of Malware”

Providing forecasts of the challenges that lie ahead in the information security landscape has become a New Year’s tradition for experts who work in this field. Over the last few years, Israel has become known as a leading nation in terms of cybersecurity research, and one of the most worrisome forecasts was recently issued by…

Details