Close this search box.


Business E-Mail Compromise-Angriffe (Imposter) durch Betrüger lassen nicht nach

Business E-Mail Compromise(BEC)-Angriffe haben in den letzten Jahren zahlenmäßig zugenommen und werden von ihrer relativen Erfolgsrate angetrieben – verglichen mit anderen finanziell motivierten Angriffen. Sie scheinen recht einfach zu sein: Der Angreifer sendet dem ausgesuchten Opfer, das für gewöhnlich ein Mitglied des Finanzteams ist, eine E-Mail und fordert es dazu

Read More >

Business Email Compromise (Imposter) Attacks Are Not Going Away

Business email compromise (BEC) attacks have been increasing in number over the last few years, driven by their relative success rate compared to other financially motivated attacks. They appear to be quite simple – the attacker sends an email to the intended victim, usually a member of the finance team,

Read More >

Blockchain and Data Security

Much has been discussed about Blockchain and Data Security and their significant impact to come. Much of my interest has been towards how to provide more authenticity to transactions and secure the history of content/data – to a forensic level if required for certain types of data (and who doesn’t

Read More >

Facebook Users Hit With Coinminer Malware

The value of Bitcoin virtual currency just hit a new all-time high, and with it an increasing number of malware threats are targeting users to “borrow” their PC’s CPU for use in mining the precious cryptocurrency, something we last wrote about in October here. Once executed, a significant spike in

Read More >

Interview with a Botnet Hunter

In this interview, Cyren botnet expert Geffen Tzur explains how botnets work and gives a view from the trenches on successes and challenges in fighting botnet cybercrime. What defines a botnet? Doesn’t all malware “phone home”? A botnet is defined as a network of infected computers set up to perform

Read More >