Explained: Domain Generating Algorithm

Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same d… Continue reading Explained: Domain Generating Algorithm

A week in security (Nov 20 – Nov 26)

A compilation of notable security news and blog posts from the 20th of November to the 26th. This week, we talked about PrincessLocker, ransomware decryptors, malvertising on the Mac, and the Windows Firewall.Categories: Security world
Week in securit… Continue reading A week in security (Nov 20 – Nov 26)

New cybersecurity report focuses on the private sector

George Washington University’s Center for Cyber and Homeland Security (CCHS), a “think and do” tank responsible for carrying out research and analysis on homeland security, counter-terrorism, and cybersecurity issues, has recently released a new report entitled “Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats”.

Categories:

Tags:

(Read more…)

Continue reading New cybersecurity report focuses on the private sector

A week in security (Oct 09 – Oct 15)

A compilation of notable security news and blog posts from the 9th of October to the 15th. This week, we touched on threat modeling, a PUP, IRS fraud, and laws concerning the usage of social media in the UK.Categories: Security world
Week in security… Continue reading A week in security (Oct 09 – Oct 15)

New UK legal guidelines for law enforcement and social media

The UK’s Crown Prosecution Services (CPS) has recently updated its social media guidelines for prosecutors and law enforcement in an effort to aid them in deciding on whether charges can be pressed against internet users based on certain online behaviors.

Categories:

Tags:

(Read more…)

Continue reading New UK legal guidelines for law enforcement and social media

Multiple scam centers raided in India for IRS fraud

Over 600 fake call center employees in India were detained early last week for suspicion of conducting fraudulent or scam calls to US taxpayers while posing as IRS agents.Categories: Business
Security worldTags: fake call centersIRS tax fraudrogue cal… Continue reading Multiple scam centers raided in India for IRS fraud

Vendor Security Alliance formed to improve cybersecurity of third-party providers

A new security alliance is created to address concerns surrounding third-party providers who are associated with some of the biggest brands users trust. They aim to increase their compliance to cybersecurity standards and lessen the risks they may pose… Continue reading Vendor Security Alliance formed to improve cybersecurity of third-party providers

Snapchat rebrands, introduces new ad platform and hardware

Snapchat is now called Snap Inc. CEO Evan Spiegel talks about 3V advertising, the platform his company adapted for ad monetization. Then he unveils a new “toy” you can wear like Google Glass, but works more like GoPro. Boom.Categories: Privacy
Securit… Continue reading Snapchat rebrands, introduces new ad platform and hardware

Think tank summarizes what happens to healthcare records after breach

The ICIT, an American cybersecurity research institute, made a case on the importance of healthcare security in an age where the threat landscape is rapidly changing yet medical institutions continually fail or are slow to adapt. As a result, patients … Continue reading Think tank summarizes what happens to healthcare records after breach

#Hackedbyseb: musical (password) chairs

Singers will often use inventive ways to gain attention from an audience, or even draw new fans in. One trend in pop circles seems to be gaining popularity, but it might not be the best hype train to hop aboard. What could go wrong by sending your favo… Continue reading #Hackedbyseb: musical (password) chairs