Author: tetiana.vashchenko@data443.com

CIO Perspective: NIEM: The key to improved information sharing – FCW

Excerpt below is from the article “NIEM: The key to improved information sharing” by Richard Spires, available at:http://fcw.com/articles/2014/12/18/niem-improved-information-sharing.aspx (Abridged) NIEM uses the XML standard to define the content of messages being exchanged. It’s about the data and how it’s structured. Users can also take advantage of tools that implement the

NEWSFLASH: The Cyber-Grinch and Cyber-Scrooge Trying to Steal Christmas!

“The Cyber-Grinch and Cyber-Scrooge hated Christmas! The whole Christmas season! Now, please don’t ask why. No one quite knows the reason. It could be their monitors weren’t screwed on just right. It could be, perhaps, that their USB ports were too tight. But I think that the most likely reason

What Are BACS Remittance Emails? And How to Spot a Fake One

A couple of days ago, we received a spam email sample that was reported to contain a malicious attachment. The email content poses as a piece of remittance advice for a specific BACS payment.  What is BACS Remittance Advice?  So, let’s explore the definition of BACS remittance advice. In essence,

Wiper family of malware targeting Sony Pictures entertainment grows

W32/Wiper.C SHA1 – CB39C8639A2F74A3424D040D22A856859AB559A8 Similar to W32/Wiper.A, this version is also is being distributed by the people behind this threat. Depending on how it is distributed, the victim may launch different file names; the most common are diskpartmg16.exe and dpnsvr16.exe. For this example we will use “diskpartmg16.exe”. The “diskpartmg16.exe” version

Wiper.A: Follow-up Analysis of Malware Targeted at Sony Pictures Entertainment

Last week, CYREN issued an early analysis of the Wiper A. Trojan/Backdoor malware, within less than 24-hours of malware identification. After further analysis, we have also found some interesting details that suggest that this malware is really targeted to the Sony Pictures Entertainment Company’s network. In our initial analysis we

The Internet of Everything: Be Prepared!

Imagine the Internet of Everything—a world where every single item you touch, from a light bulb to the brake system in your car, has a microcomputer and IP address. All the data stored on the device is accessible 24/7 from anywhere in the world. Now imagine the type of information

The State of Corporate Security

The Companies—Home Depot, JP Morgan Chase, Target. The Information—56 million credit cards, 76 million ‘households’, 7 million small businesses, and 110 million accounts The Impact—According to recent reports, Home Depot estimates that investigation, credit monitoring, call center, and other costs could top $62 million. Target’s stock fell by almost 14%

CYREN Notes Botnet Expansion: Increase in Malware Distribution Correlates with Decrease in Spam—Companies Urged to Remain Alert to Malware Detection and Mitigation

In recent weeks, CYREN has noted a dramatic increase in the number of active malware-sending bots, which appears to correlate with a slowdown in spam-sending bots. Periodically throughout the year, CYREN analysts see these types of fluctuations. Reasons vary, although CYREN analysts suspect that botnet owners are “repurposing”, with the

Addressing the Growing Threat of Phishing Attacks

Phishing attacks have seen considerable growth over the past few years. Here are just a few of the astounding facts: In 2013, CYREN observed a 264% increase in phishing scams. Almost 70% of all IT professionals observe and experience a phishing attack at least once a week. PayPal remains the