KRACK-vulnerability

What You Need to Know about KRACK Attacks

Taking a deeper look at the KRACK Wireless Vulnerability Background In May of 2017, security researcher Mathy Vanhoef published a technical paper outlining a potentially catastrophic vulnerability within an encryption protocol used within Wireless Computer Networks. This vulnerability has taken the “protected” out of Wi-Fi Protected Access II (WPA2) Wireless Networks. Those networks, both corporate…

Remember . . . Always Practice Safe BYOD

Bring Your Own Device (BYOD) Into Your Business No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement. We live in an exciting time when work can be done at any time from any place. Employees love the fact that…

Popcorn Time ransomware

Christmas is for Sharing the “Nasty Way” – WHAT?!?!

Popcorn Time Ransomware   Merry Christmas! Just in time for the holidays, a new piece of ransomware is turning heads in the malware security community, but perhaps not for the reasons you might expect. The freshly discovered Popcorn Time ransomware spins a tale nearly as compelling as the illegal movies streaming on the bittorrent client…

The Security Synthesis Brief

The urgency of Information Security

Small to Medium Business (SMB) is the most actively targeted and exploited business demographic. On average SMB firms that reported a security incident found that the intruder(s) were active on their business information systems for months prior to detection. The majority of SMB’s are protected with little more than a firewall at the network edge.

Detection and Prevention: The art of the attack

Detection and Prevention It seems that every week another substantial data breach is announced. Personal data such as Social Security Numbers, Credit Card Information, and even protected Health Information is routinely snatched by attackers. The FBI has reported that the average time attackers operate undetected within a victim network (the “dwell time”) averages 176 days.…

Are you smarter than a CyberCriminal?

Every day high-functioning and intelligent individuals are duped by crafty criminals. While there are still hold-up’s and theft within organizations, much of the criminal activity that targets Small and Medium Businesses (SMB’s) is cybercrime. This term used to be uttered only in the halls of security firms and large enterprise. Today, it’s in the mainstream…