The WSJ just reported that the new coronavirus has thrown the M&A dealmaking into disarray. They said: “cybersecurity experts say the workplace upheaval caused by the pandemic will complicate mergers and acquisitions when activity picks up. Countless employees are working remotely on networks that might be vulnerable to attack, while others with access to confidential […]
[Video Review] Sitting Ducks: When Employees Work from Home
Hi this is Scott Young from Optrics Engineering and we understand that things are kind of rough out there with the current pandemic. We wanted to start shooting some videos and things that we’re seeing on the networking side that might be of help to those of you out there who are managing their […]
Sitting Ducks: When Employees Work from Home
As the COVID-19 health crisis rages on and millions of workers and students move to working from home (WFH) and online distance education, no one should make the error of thinking that working and learning from the comfortable and familiar surroundings of home somehow makes these employees and students safe. They are not safe. If […]
You Can’t Always Trust a Dot-Gov Domain
It may be easier than one thinks to register a dot-gov domain, according to KrebsOnSecurity. People have tended to regard urls with the top-level domain dot gov as generally reliable, but this may need to change. KrebsOnSecurity says it “received an email from a researcher who said he got a .gov domain simply by filling […]
Automated Tailored EBAY Spam Campaign Leads to Risky Sites
Automated spam on eBay is spreading tailored phishing messages offering to promote users’ products, and the links the spammers share can lead to dangerous websites, according to Paul Ducklin at Naked Security. The messages themselves contain text customized to a product the target has just posted, and they include an image of a shortened, easy-to-read […]
Why Do Organizations Still Under-report Cybercrime?
It’s estimated that organizations aren’t engaging with Law Enforcement when becoming a victim of a cybercrime in large numbers. We cover 5 reasons why organizations don’t. After a confirmed cyberattack, there are a number of tasks that need to be done; figure out what happened, assess the scope of any damage done, figure out where […]
Phishing Campaign Impersonates Email Alerts From DHS
An ongoing email-based phishing scam is attempting to fool recipients into opening malicious attachments disguised as notifications from the U.S. Department of Homeland Security (DHS), according to the Cybersecurity and Infrastructure Security Agency, in a warning posted on the official US-CERT web site this past Tuesday. “The email campaign uses a spoofed email address to […]
“File Deletion” Alert Becomes the Latest Scam to Compromise Office 365 Credentials
Attackers use simple cause for concern as the basis of a scam intent on tricking victims into offering up their Office 365 credentials. A very official-looking email is making the rounds, taking advantage of the approximately 50% of companies today using Office 365. And it’s not surprising, as Microsoft is the most impersonated brand in […]
Top Seven DDoS Protection Challenges
Although there are now more DDoS protection solutions available than ever before, companies still tend to face a few major hurdles with DDoS defense. From attack complexity to a lack of granular control, the challenges that organizations are up against are as varied as they are difficult. Here, we’ll look at the top-seven DDoS protection […]
Extortion Threatens Reputational Damage
Scammers are sending emails threatening to damage the reputation of websites unless the sites’ owners hand over 0.3 bitcoin, or around $2,400, according to BleepingComputer. The attackers say that they’ll send out billions of spam emails to millions of email addresses and websites. All of these emails will be spoofed to appear as though they’re […]