Category: Blog

Hidden Malware and the Ghosts of Mobile Technology

Android Malware “GhostPush” Already discovered packaged into 39 different Android apps, “GhostPush” (sometimes also called “Rootnik”) malware turns an infected device into a platform for the installation of adware, unwanted homescreen links, and further malware. Victims have found the malware to be deeply entrenched and difficult to remove.  Malicious Code

How Do You Eat the IG Elephant? One Bite at a Time!

How Do You Eat the IG Elephant? One Bite at a Time! A Practical Approach to Information Governance Design A lot of people who need information governance put it off because the task seems so overwhelming. But achieving a well-designed and manageable information governance solution is not as daunting as

Phishing Emails Targeting Chinese Users

Chinese users – a very attractive target for phishing attacks Chinese people are increasingly getting online and adopting mobile services. 2014 was a pivotal year, with the massive adoption of mobile services by over 560 million users. It is anticipated that more than half of the entire population of China

Q3 Cyber Threat Report: Cyber Security Awareness

Cyber Security Awareness Month October was Cybersecurity Awareness Month. Out of curiosity, I looked online to see what sort of information was available on the topic. I wasn’t surprised by the results; there were thousands of links, including newspaper articles, infographics, and general awareness notices, with sources that included the

Turning IG into ROI

Turning IG into ROI Making Information Governance Analytics Pay Off It’s no secret that the divisions of a company that contribute to the corporate bottom line drive the company’s business decisions. Efforts to devise and enforce compliance to information governance (IG) may be seen as merely “gate-keeping,” but turning IG

The OPM Data Breaches – Doing Business in a Zero Trust Environment

The data breaches at the OPM have significant ramifications for the government and for the millions of us that may be negatively impacted in the future. However, breaches present a unique impetus to drive much needed change in policies, technologies and monitoring. It has been reported that the breach was

The World of Limitless Identity

When I joined Resilient Network Systems as CEO roughly a year and a half ago, I was very excited about how the company was revolutionizing the world of information sharing and creating a safer Internet.  Being able to safeguard the data being accessed, while enabling more sharing and collaboration is

Bartallex special delivery: Fareit and Vawtrak

Earlier this year we witnessed several enterprises being targeted by Bartallex in spam emails. Bartallex uses Microsoft Word documents and social engineering techniques to trick enterprise users into opening and executing the embedded macro code in the document. When enabled, the macro code downloads and executes banking malware Dridex, a

Rise of Malicious Resumes in the Fall Hiring Season

Summer is finally over and it’s time for employers to refocus and take advantage of the remaining budget for the year to get new recruits in before the holiday season starts. Essentially, fall season is the time when people like fresh college graduates come into the market looking for new

Domain Validation (DV) SSL Certificate used for PayPal Phishing

As users become more aware of phishing and data theft, they become more cautious. Unfortunately as users become more cautious, attackers must become more devious. In a recent discovery, we found a phishing website that had been issued a valid SSL Certificate. SSL Certificates are small data files that activate