720-891-1663

The Insider Threat – At The NSA!

Some of you probably remember Edward Snowden (just kidding!).  Snowden was a Booz, Allen, Hamilton employee, on contract to the NSA.  Well now there is another Snowden at Booz. Booz has annual revenue in excess of $5 billion and has contracts all over the federal government. Earlier this month, the feds arrested Harold Thomas Martin […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Employee Training is a CRITICAL Component of Security Training

According to Buzzfeed, nine days after Hillary Clinton had won big on Super Tuesday, the Russians launched their cyber attack on her campaign. The Russians sent malicious emails to all of her senior campaign staff.  The emails looked like standard Google GMail emails alerting to suspicious activity on their accounts and asked them to click […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Hackers Use Virtual Skimmers To Steal Credit Cards From Web Sites

You’ve probably heard about credit card skimmers that hackers attach to everything from gas pumps to ATMs to self checkout terminals at grocery stores, all in an effort to steal your credit card info. As more stores go to chip based credit cards where stealing the information off the stripe won’t let hackers use that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Internet of Things – The New Hacker Attack Vector

Recently, Brian Krebs (KrebsOnSecurity.com) was hit with a massive denial of service attack.  The site went down – hard – and was down for days.  His Internet Service Provider kicked him off, permanently.  The attack threw over 600 gigabits per second of traffic at the site.  There are very few web sites that could withstand […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Learning About Ransomware – The Hard Way

A small New England retailer learned about ransomware the hard way.  After an employee clicked on a link, that system was infected with Cryptowall. The malware encrypted, among other files, the company’s accounting software. The accounting software did not live on that user’s computer;  it lived on the network, but since that user had access […]

Continue reading → [DISPLAY_ACURAX_ICONS]