Category: Blog

Box – Security Best Practices for External Sharing on Content Collaboration Platforms

The Security Best Practices for External Sharing on Content Collaboration Platforms blog series examines the state of security for external sharing on the leading Content Collaboration Platforms (CCP). Each week we’ll review a different platform and make security best practice recommendations. Background Box is a California-based public company that was founded in

Blockchain and Data Security

Much has been discussed about Blockchain and Data Security and their significant impact to come. Much of my interest has been towards how to provide more authenticity to transactions and secure the history of content/data – to a forensic level if required for certain types of data (and who doesn’t

Facebook Users Hit With Coinminer Malware

The value of Bitcoin virtual currency just hit a new all-time high, and with it an increasing number of malware threats are targeting users to “borrow” their PC’s CPU for use in mining the precious cryptocurrency, something we last wrote about in October here. Once executed, a significant spike in

Interview with a Botnet Hunter

In this interview, Cyren botnet expert Geffen Tzur explains how botnets work and gives a view from the trenches on successes and challenges in fighting botnet cybercrime. What defines a botnet? Doesn’t all malware “phone home”? A botnet is defined as a network of infected computers set up to perform

Analysten-Bericht: Phishing-Angriffe sind ein Geschäftsproblem, kein IT-Problem

Überall wird über erfolgreiche Phishing-Angriffe berichtet. Diese stellen eine der größten Sorgen für IT-Manager dar – wie aber lässt sich der wirtschaftliche Nutzen einer zusätzlichen, fortschrittlicheren E-Mail- und Web-Security verdeutlichen? In einem neuen Bericht hat der Analyst der Security-Branche, Derek Brink von der Aberdeen Group, die Zahlen zusammengestellt und die

Do You Know the New PII Rights under GDPR?

Do You Know the New PII Rights under GDPR? What is your current address? What was the yearly salary of your last position? What is your Social Security (national insurance) number? Consider how many PII (personally identifiable information) questions your organization asks for background checks of individuals being vetted as

New Scarab Ransomware Using Necurs-as-a-Service

13.3 million Scarab ransomware emails detected in one day The new Scarab ransomware being distributed via email by the Necurs botnet appears to come from scanning devices or services like HP, Epson or Lexmark. While there are similarities to the Necurs-distributed Locky ransomware, Scarab seems to have been developed by