Category: Blog

Richard Spires’ Keynote at DGI Enterprise Architecture Conference & Expo

Richard A. Spires, CEO, Resilient Network Systems, Inc., and former CIO of the US Department of Homeland Security, will be delivering the opening Keynote presentation at the DGI: Digital Government Institute’s Enterprise Architecture Conference & Expo, the morning of April 30, 2015 (8:30am-3:00pm EDT) at the Ronald Reagan Building’s Pavilion

Gazon SMS Trojan targets Android users by promising Amazon gift cards

Gazon is a malware targeting Android phones that sends multiple SMS text messages to every contact in the victim’s phone book. After opening the malware on the Android device the victim is told that he has won an Amazon gift card for $200. To redeem the gift card the victim

Revisiting Old Cybercriminal Techniques: PSYME Malware Revival

Zeus, ZeuS, or Zbot; a Trojan horse computer malware, has been around for a long time. It is known that the Zeus bot sends out spam emails that contain an executable binary which will download and install a bot program into the affected machine. Recently, we detected a Zeus Bot

Security-as-a-Service: Applied Cyber Intelligence for Enterprises

When applying the concept of trust to the security-as-a-service (SecaaS) delivery model, it is useful to think in terms of security history. With access to the Internet and email came viruses, spam drive-by downloads and phishing, and the corresponding perimeter security software and hardware to protect corporate systems. But, software

No Hidden camera on fake Youtube/Vimeo pages – only hidden malware

Last week, CYREN detected interesting emails that contained links to fake video pages. We have included a screenshot of the email. The rough translation of the subject line is “hidden camera in their house”, and the Youtube link looks like it might deliver the goods – but of course the

Destroying the ROI of Cybercrime– Part 2

In the battle to defend against the ever-increasing volume and variety of threats, security solutions like firewalls, signature-based antivirus, and blacklisting may be ineffective. This is because the criminals know that the data that powers them may lag new threats by days or even weeks. Cybercriminals have now further raised

Destroying the ROI of Cybercrime – Part 1

2015 will be another tough year in the continuing fight against cybercrime. Today’s Internet threat landscape is highly dynamic, as thousands of malicious actors disseminate hundreds of millions of global threats daily. While some actors are hacktivist organizations and even nation-states, the main threat remains that of well-funded cybercriminal gangs.

Honorable Billy Tauzin joins Board of Directors at Resilient Network Systems

SAN FRANCISCO, Feb. 13, 2014 /PRNewswire-iReach/ — Resilient Network Systems, Inc., the leading provider of Trust Network solutions, today announced that the company has appointed the Honorable Billy Tauzin as member of their Board of Directors. (Source Link) Tauzin had a long and distinguished 34-year elective career culminating in chairing

Innovative Architecture Addresses Student Digital Privacy Act Challenges – Press Release by RNS & NLET

Trust Networks support education systems’ compliance with new Federal and State legislation on data privacy (via Yahoo! Finance) SAN FRANCISCO, Jan. 27, 2015 /PRNewswire-iReach/ — Resilient Network Systems, Inc., a leading provider of advanced access control and privacy solutions, and the National Laboratory for Education Transformation (NLET), a Silicon Valley non-profit dedicated to modern