In a blog post dated August 17, FireEye is reporting a huge increase in “Locky” ransomware distribution via maliciously-crafted .DOCM email file attachments (macro-enabled Word files). The health care industry seems to be the hardest-hit in this campaign, and the...
Tag: Security
Citrix Secure Browser Service Delivers Web Apps Quickly and Simply
According to Gartner, over fifty percent of corporate applications are now delivered via the browser. Unfortunately, many Web applications, especially legacy applications, require a specific version of Internet Explorer, and/or require Flash or Java functionality that may or may not...
Beating Malware by Disrupting Command and Control
One of the key strategies in modern warfare is disrupting the enemy’s command & control infrastructure. It can also be an effective strategy in the ongoing war against malware. One of the first things that usually happens when a PC...
ESET Introduces Hardware-Encrypted USB Drive
It seems that data security is a never-ending battle, and it has become obvious that we need multiple layers of protection to deal with the proliferation and constant evolution of security threats. Today’s security topic is the ubiquitous USB “thumb...
The Great Superfishing Expedition of 2015
In a move that will probably end up in the top ten technology blunders of the year, Lenovo decided, starting in September 2014, to pre-install Superfish VisualDiscovery software on some of their PCs. (Fortunately for most of the readers of...
What’s Your Password?
Earlier this month, we posted a couple of articles on the state of cyber security. Of course, one of the biggest problems with cyber security is that too many people don’t take it seriously enough. Don’t believe me? Take a...
The State of Cybersecurity
As we move into 2015, it’s appropriate to look back and think about what we’ve learned about the threat landscape. To that end, CheckPoint’s 2014 Security Report makes for some pretty interesting reading. According to their research, in a typical...
Security Breaches – Assigning the Blame
One of the few newsletters I try to read on a regular basis is the one put out by the good folks at WServerNews.com. Their January 5 issue has an excellent article on security entitled “Blame the Software.” In part,...
eDiscovery Part 4 – The Discovery Process
This is the fourth and final installment in our series of blog posts on eDiscovery, containing video excerpts from the presentation we made on September 26 at the O365 Nation Fall Conference in Redmond. This installment is a bit longer...
eDiscovery Part 3 – Discovery Hold in Microsoft Exchange
This is the third in our series of blog posts on eDiscovery, containing video excerpts from the presentation we made on September 26 at the O365 Nation Fall Conference held in Redmond. Part 1 dealt with the lifecycle of an...