2016 Summer Olympics: In The Crosshairs As the 2016 Summer Olympics approach, the cyber community turns its attention to the crowds and target-rich environment created by Daniel Smith |July 20, 2016
5 Cyber Attack Developments Worth Your Attention Are you concerned about being targeted? I am. As an IT person, it’s hard not be afraid when cyber attackers Ben Zilberman |July 14, 2016
Malware and Botnet Attack Services Found on the Darknet Over the last several months we have explored a number of attack marketplaces along with the different tools and services Daniel Smith |July 13, 2016
Early Attack Activity Forcing New Thinking in Healthcare IT/Security Every year when we conduct our survey for the Global Application & Network Security Report, one of the more interesting Ben Desjardins |July 07, 2016
Threat Alert: Bitcoin Exchanges and Websites Experiencing DDoS Attacks Over the last several months, our ERT Research team has noticed a growing trend of attackers targeting Bitcoin exchanges and Daniel Smith |July 06, 2016
A View from the Corner Offices: New Research on C-Suite Security Mindset The role of the modern information security executive is, in many ways, an unenviable position. The continuous pressure to protect Ben Desjardins |June 28, 2016
Here are the specific ways the 2016 Republican National Convention (RNC) and Democratic National Convention (DNC) will be Cyber-Attacked Major Attack Type: Denial of Service AttacksDenial of Service (DoS) attacks have grown each and every year since 2010. Moreover, Carl Herberger |June 02, 2016
Aviation Accidents: Many Risks Move from Mechanical Failures to Terrorism. Are Cyber-Attacks Next? EgyptAir’s 20 Year Terror History:Some quick thoughts on the most recent loss of EgyptAir’s flight 804 and how persistent terror Carl Herberger |May 26, 2016
The Rise of Smartphone BotNets Smartphone botnets have become increasingly popular over the last few years. Android software is highly vulnerable to malware and is Daniel Smith |May 25, 2016
Is Your Data Secure From Hackers? Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Prakash Sinha |May 24, 2016
Cyber Attack Market Place Last month, I gave an introduction to the Darknet. In this blog, I’d like to talk specifically about what an Daniel Smith |May 12, 2016
Your Risk Checklist to Protect Against Online Business Cybersecurity Threats Last month, we took a look at how the transformation of businesses of all sizes and in nearly all industries Ben Desjardins |May 11, 2016