Search
Close this search box.

Blog

On Demand Webinar – Botnets: the Clone Armies of Cybercrime

Last week we hosted a webinar titled “Botnets: The Clone Armies of Cybercrime.” Cyren security researchers, Avi Turiel and Geffen Tzur, discussed the history and current state of botnets and shared insights on malicious bot behavior, how to spot it, and what you can do to protect your organization. Some

Read More >

Regular Expressions (RegEx) and ECM

Regular Expressions (RegEx) and ECM Language is a curious thing. Letters and symbols combine and form words to capture ideas. These ideas are strung together in sentences and paragraphs to increase knowledge, share feelings, and inspire others with new and fascinating ways of thinking. Every language has a rhythm and

Read More >

Malicious Google Chrome extension spreads nude celebrity pdf’s to Facebook

A researcher at Cyren has found that a malicious Google Chrome extension is spreading nude celebrity PDFs to Facebook groups. A user is uploading a PDF document to groups with the name: ”Jessice_Alba_Leaked-sextapeVide_oSun_Dec_4_2016_22_99.mp4.pdf“ Opening the PDF reveals a nude picture with a ”Play“ button in the middle. Clicking on the

Read More >

Resilient Network Systems Revamps Identity Access Management, Announces Resilient Access 3.0™

Contextual Access Control Powers Secure Information Sharing Across BoundariesDecember 08, 2016 09:00 AM Eastern Standard Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced the release of Resilient Access 3.0, a groundbreaking contextual access solution designed for the connected organization. Resilient Access 3.0 extends access capabilities

Read More >

Why your email isn’t as secure as you think it is

Recent headlines are chock-full of reports of email phishing attacks by cybercriminals who outwit employees to obtain sensitive personal data and financial information. Under the guise of recognized web payment and productivity tool requests, hackers lure potential victims into clicking on fake email links that are designed to steal credentials

Read More >

HTTPS is now over 50% of internet traffic – are we safer?

The era of “HTTPS Everywhere” After years of calling for “HTTPS Everywhere” on the web and encouraging websites to use HTTPS by default, Google officials say the effort has begun to pay off. New data released at the end of October 2016 shows that more than 50% of all pages

Read More >

Resilient and Team win Phase 1 of the Move Health Data Forward Challenge

Resilient along with its partners WebShield Inc., SAFE-BioPharma (@SAFE_BioPharma), Carebox (@CareboxHealth) and InterSystems (@InterSystems) are delighted to announce that we have won Phase 1 of the Move Health Data Forward Challenge.  This prestigious challenge is staged by The Department of Health and Humans Services’ Office of the National Coordinator for Health Information

Read More >

3 Reasons You Need a Virtual Data Room

3 Reasons You Need a Virtual Data Room The top performing businesses in 2016 will perfect the art of connection — in fact, this economy has been labeled the Connection Economy. Consider the largest “taxi company” doesn’t own a car (Uber); the largest “hotel chain” doesn’t own a building (AirBnB); and the

Read More >