720-891-1663

Why Employee Training is a CRITICAL Component of Security Training

According to Buzzfeed, nine days after Hillary Clinton had won big on Super Tuesday, the Russians launched their cyber attack on her campaign. The Russians sent malicious emails to all of her senior campaign staff.  The emails looked like standard Google GMail emails alerting to suspicious activity on their accounts and asked them to click […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Use Virtual Skimmers To Steal Credit Cards From Web Sites

You’ve probably heard about credit card skimmers that hackers attach to everything from gas pumps to ATMs to self checkout terminals at grocery stores, all in an effort to steal your credit card info. As more stores go to chip based credit cards where stealing the information off the stripe won’t let hackers use that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Internet of In-secure Things

Hackers are combining the Internet of Things with a 12 year old open source software bug and creating a potential mess. Last week tens of thousands of hacked Internet of (in-secure) Things devices created a 600 gigabit per second attack against a security blogger’s web site and just after that, these devices created a  terabit […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Internet of Things – The New Hacker Attack Vector

Recently, Brian Krebs (KrebsOnSecurity.com) was hit with a massive denial of service attack.  The site went down – hard – and was down for days.  His Internet Service Provider kicked him off, permanently.  The attack threw over 600 gigabits per second of traffic at the site.  There are very few web sites that could withstand […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Learning About Ransomware – The Hard Way

A small New England retailer learned about ransomware the hard way.  After an employee clicked on a link, that system was infected with Cryptowall. The malware encrypted, among other files, the company’s accounting software. The accounting software did not live on that user’s computer;  it lived on the network, but since that user had access […]

Continue reading → [DISPLAY_ACURAX_ICONS]