Category: Blog

Resilient Network Systems Selected as a Red Herring Top 100 North America Tech Startup

San Francisco, CA – June 3, 2013 – Resilient Networks Systems, the leader in Trust Management, was named to theRed Herring Top 100 during the annual conference held in Monterey on May 21-23, 2013. The award recognizes the leading private companies in North America, celebrating their innovations and technologies across their respective

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).  The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing page

Building Your Digital Profile, Piece by Piece…

Livingsocial.com, the daily deals site was hacked last week, with details for over 50 Million accounts, including Customer Names, Emails, Birthdates and Encrypted Passwords being stolen. This event comes at a difficult time for the company, as they attempt a corporate comeback having recently received an infusion of cash from

Poetry Spam: A Sole Act of Charity

Last week I received an email from Rina Patel (although her email address implies “Daniel” as first name), subject: “Kindly Assist”. Rina is from Japan (although her/ Daniel’s email address is from Uruguay) and was married to an English man from the UK, called “Late Sir Patel”. Sir Patel “was

Shameless malware distribution abuses Texas explosion and Boston Marathon Attack

Malware distributors are turning to recent events to get recipients to follow links to infected websites. The recent “Pope-themed” malware attack is one such example. The attacks at the Boston Marathon and the explosion at a Texas fertilizer plant have been quickly exploited with large quantities of emails sent out

Phony Google Drive site tries to Phish multiple domains

I received the email below from a friend whose Gmail account had clearly been compromised (followed by an apology email from the same friend).   The email includes a link to sign into Google docs to view a “very important” document. Clicking on the link leads to a somewhat convincing

Keeping the Zombies out

The continuing spread of botnets poses a new challenge for online and mobile application designers. Malware-infected machines often have code installed to log keystrokes, steal information, or even initiate background actions without the user’s knowledge. As designers, how do you ensure that the user really is who they say they