Blog

Insights on Data Security & Threat Intelligence

Need a Password for a Stolen iPhone?

Apple’s “find my iPhone” is one of the most useful reasons to be connected to iCloud. If your iPhone is lost you can leave a message onscreen for the finder to contact you.  Since the introduction of iOS7, the activation of “find my iPhone” also prevents erasing/resetting of the phone

Read More >

Locky Returns After 22 Day Break with Sandbox Evasion Techniques

There has been much speculation in the Internet Security industry about the status of Locky – the ransomware heavyweight of February-May 2016 which suddenly ceased distribution at the start of June. As we previously reported Locky was distributed in vast email outbreaks, many times exceeding 10 billion emails/day and often

Read More >

Resilient Office Moves to SOMA!

We have moved to a new office, leaving the more formal FiDi behind and taking a bold step across Market Street to our new home in SOMA! It’s like a whole new world over here, with our own micro-climate in SF Climates app, more casual dress codes, and lots of

Read More >

Resilient Adds Google Authenticator to Its Network

We are happy to announce that we’ve added Google Authenticator to our menu of pre-integrated authentication methods. You can now include this widely used method when creating adaptive access policies to protect your documents and apps. Google Authenticator is based on a Time-based One-Time Password (TOTP) that is generated by the Google

Read More >

Corporate Crime and Hospital Hacks – Locky Shuts Down Businesses

Viral pandemics are certainly cause for a hospital to declare a “state of emergency.” But in the case of Methodist Hospital in Kentucky, the virus that caused the “internal state of emergency” didn’t relate to hundreds of patient-filled stretchers… In this instance, Locky had infected the hospital’s entire computer system,

Read More >

Bitcoin Phishing Targets Users via Google AdWords

As we have pointed out several times, cybercrime is a business, and running a malware or phishing campaign does require some financial investment by the bad actors. Rental of botnets, purchase of exploit kits, and acquisition of compromised site lists are all expenses that need to be covered by the

Read More >

Cyren’s May 2016 Cyberthreat Report – Overview

Over the last few years, we’ve repeatedly reported on the fact that cybercriminals are stealthy, smart, and sophisticated. They’re building global organized cybercrime syndicates and, with one simple piece of malware, can generate millions of dollars in just a few days. Like any aggressive business, they’re capable of altering their

Read More >