Transatlantic Cable podcast, episode 183
For the 183rd edition of the Kaspersky Transatlantic Cable podcast, Jeff and I look at some of the big news stories doing the rounds in the field of cybersecurity. We begin again with the recent Capitol Hill attacks, and this time, a news story suggesting that House Speaker Nancy Pelosi’s…Read More
Employee Spotlight: The Human Faces Behind Artificial Intelligence
Webroot BrightCloud® Threat Intelligence relies on the collective power of millions of devices working together. But what sometimes gets lost is the actual humans behind bringing this technology to market. In this Employee Spotlight, we talk to Account Development Executive, Jordan Gray, who works with C-level executives to integrate threat…Read More
Ransomware’s cryptofootprint
Cybercriminals made off with more than $16 million from ransomware from 2016 to 2017.Read More
COVID-19 lockdowns stall career progressions for women in tech
The effect of COVID-19 has, I think we can all agree, been felt throughout the whole world and throughout all faucets of everyday life. From lockdowns to face masks — we’ve all had to make changes to our everyday life. However, lockdown life was generally predicted to bring about a…Read More
Telegram security and privacy tips
Facebook’s WhatsApp recently updated its privacy policy, causing many disgruntled users to switch to rival messengers, among them Telegram. Thanks largely to this exodus, Telegram added 25 million new users in just a few days, pushing its user base over the 500 million mark. That makes this the perfect time…Read More
Kaspersky Transatlantic Cable podcast, episode 182
For the 182nd edition of the Kaspersky Transatlantic Cable podcast, Dave and I tackle the biggest story of 2021 so far: the ramifications of the insurrection at the US Capitol, which include Twitter bans and plenty more. To kick off the podcast, we talk about an op-ed on ZDNet about…Read More
Cyber News Rundown: Gaming Industry in Crosshairs of Cybercriminals
Top gaming companies positioned to be next major cyberattack target After healthcare and higher education emerged as lucrative targets for cyberattacks in 2020, researchers have identified the video gaming industry as another key target. By scouring the dark web for stolen data belonging to any of the top 25 largest…Read More
Maze Ransomware is Dead. Or is it?
“It’s definitely dead,” says Tyler Moffitt, security analyst at Carbonite + Webroot, OpenText companies. “At least,” he amends, “for now.” Maze ransomware, which made our top 10 list for Nastiest Malware of 2020 (not to mention numerous headlines throughout the last year), was officially shut down in November of 2020.…Read More
An employee, fired
Hell hath no fury. A former medical device supplier sabotages deliveries to customers.Read More
How to tell if a website is taking your (browser) fingerprints
Whether you’re looking at the whorls and loops of a fingertip or analogously unique browser information, using a fingerprint is a highly accurate way to identify someone. It’s a lot harder to get a person’s fingerprint without their knowledge, but all kinds of services on the Internet ID users by…Read More
Delivery payment fraud
People are receiving phishing e-mail messages with requests for payments for a package delivery, with links to a fake postal service website for making the payment.Read More
Gone in a Flash
No one should be using the dead technology, and any websites that still use it need an update.Read More
Hard-coded account in ZyXel equipment
This past Christmas, researcher Niels Teusink of the Dutch company EYE reported a vulnerability in Zyxel equipment: an undocumented admin-level account called “zyfwp” with a hard-coded password in a number of hardware firewalls and wireless controllers. The firmware code contains the password, which is unencrypted. Owners are urgently advised to…Read More
Ethernet, now broadcasting
Can you transmit wireless data over a wired network? Evidence shows it can be done.Read More
Transatlantic Cable podcast, episode 181
Welcome to the first episode of the Kaspersky Transatlantic Cable podcast of 2021. Unfortunately, COVID-19 is still here, but so are we (take that how you will). First, we have to pour one out for Adobe Flash. The much-maligned platform, which is almost as old as the Internet itself, has…Read More
Air-Fi is another path to stealing data from an isolated computer
To keep secret information beyond the reach of attackers, organizations place it on devices that are not connected to a local network, let alone the Internet — so-called air-gapped computers. However safe that may sound, infecting such a machine or a network segment is actually not that difficult (recall the…Read More
Welcome to our kitchen
This head-spinning year is finally drawing to a close. Sure, 2020 will be remembered for all sorts of unforeseen events and difficulties, but it’s presented some cool opportunities as well! As for us, we have been busy expanding our operations — not only in the traditional computer cybersecurity segment, but…Read More
Episode 48| The Year in Cyber: 2020
2020 has been a year no one predicted. COVID-19 has made remote work the norm and shook up the attack landscape, with attackers jumping on new opportunities for social engineering. Through it all, breaches and ransomware attacks continued to plague organizations. In episode 48 of Cyber Security Sauna, we’re looking…Read More
What is account takeover?
Account takeover means that someone has been able to break into your online user account one way or another. Account takeover fraud (ATO) can have very serious consequences, and it can require a lot of work and time to fix the situation.Why should you care about account takeover? While account…Read More
Cinderella and the signature-based detection
In the olden days, people were not exactly au fait with technologies that wouldn’t appear for centuries or even millennia, which is why the cybersecurity lessons we find in fairy tales tend to need some excavation. Encrusted in metaphor, conjecture, and literary tinsel, the original meanings of familiar fairy tales…Read More