Article Query: Phishing
September 5, 2011

It is no secret that cyber attacks are growing in complexity and severity.  In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee.  The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United [...]

August 15, 2011

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads.  The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was [...]

July 26, 2011

The term security posture is used in information security to describe the overall security effectiveness of a given system, service, or network.  All aspects of security strength and weakness are evaluated and weighed against both potential and known threats in an effort to gauge the current level of protection.  This same process can be used [...]

July 4, 2011

33% of people use the same password for every web site they access.  62% do not use complex passwords or change their password frequently.  Of the nearly 75 million scam emails sent every day, 2000 claim a victim.  73% of Americans were the victim of some form of cybercrime.  25% of all cybercrime remains unsolved.  The [...]

July 3, 2011

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online.  As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not [...]

June 18, 2011

Microsoft announced on Thursday the findings of a survey which revealed that over 7000 Windows home and business customers in several countries–including the United States, United Kingdom, Ireland, and Canada–have been targeted by a phone phishing scam.  According to Microsoft, “the scam works by criminals posing as computer security engineers and calling people at home [...]

February 12, 2009

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. CIOs and IT managers will depend [...]