WhatsApp Security Issues

WhatsApp-SpyingKerrie Mccune from spyengage.com wrote a guest post about her thoughts on known WhatsApp Security Issues. 

The use of smartphones is the best way to stay in touch with your loved ones. And with the upsurge in the development of the instant messaging apps such as WhatsApp, Viber and a lot more have completely knocked out the traditional text messaging trend and have taken over the world of messaging. Even though there’s always a doubt with hacking of these apps; hacking WhatsApp has been confirmed as the easiest deal for an amateur hacker. Continue reading

VN:F [1.9.22_1171]
Rating: 4.0/5 (2 votes cast)

2015 Verizon Breach Investigation Report (VBIR) Out Now – First Look

verizonreport1

The latest 2015 Verizon Breach Investigation Report (VBIR) is now out and can be downloaded HERE. For those that have not seen these reports, they survey a number of customers and gather information about different types of breaches. It is a trend based report but great data to get an idea of which types of attacks are being seen by different types of businesses. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Threat Spotlight: TeslaCrypt – Decrypt It Yourself

teslacrypt-payment-options-100573479-large.idge_

I’ve posted about Ransomware such as Cryptolocker and Cryptowall (cyrptowall 2.0 HERE / Cryptowall 3.0 HERE). The idea behind Ransomware is malware ends up on a user’s system and encrypts all data on the hard drive. The malware informs the user that all data is encrypted and asks for a sum of money for the key to unencrypt the data. There typically is a time frame that the user can pay before the key is destroyed and all data is lost. There have been many variations of this threat and one recent version seen in the wild is TeslaCrypt. I have heard crazy stories such as people getting a phone call and the people claim to be Microsoft helpdesk however really attackers tricking people to install cryptolocker (learn more about this HERE).

Cisco’s security team Talos wrote a great post on how to decrypt aka save your data from the TelsaCrypt ransomware. The original post can be found HEREContinue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Rapid7 Extends IT Security Data and Analytics Platform with Acquisition of NT OBJECTives

rapid7+metasploitBoston, MA – May 4, 2015 Rapid7, a leading provider of security data and analytics software and services, announced today that it has acquired NT OBJECTives (NTO), the web and mobile application security testing company, expanding Rapid7’s Threat Exposure Management offering to further meet the needs of modern business infrastructures. NTO’s application security testing solution – trusted by many Fortune 500 companies – analyzes web applications for security vulnerabilities and maximizes organizations’ ability to effectively reduce IT security risk. Rapid7 is offering this technology under the name Rapid7 AppSpider, available immediately to customers. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Threat Spotlight: Upatre – Say No to Drones, Say Yes to Malware

PDFMalwareThe Cisco security research team Talos posted a very good article on their research of the Upatre malware. In summary, the malware has advanced its ability to hide in SSL encryption making it tougher to track. For some reason, the latest version of the malware also seems to be using a “Say No To Drones” PDF for delivery. You can find the original post HERE. Here are the details on this interesting research.

Talos has observed an explosion of malicious downloaders in 2015 which we’ve documented on several occasions on our blog. These downloaders provide a method for attackers to push different types of malware to endpoint systems easily and effectively. Upatre is an example of a malicious downloader Talos has been monitoring since late 2013. However, in the last 24-48 hours, things have shifted dramatically. We’ve monitored at least fifteen different spam campaigns that are active between one and two days.  While the topic associated with the spam message has varied over time, the common attachment provided is a compressed file (.zip or .rar) that contains an executable made to look like a PDF document by changing the icon. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Raytheon to buy cybersecurity firm Websense in $1.9 billion deal

One of Raytheon's Integrated Defense buildings is seen in San DiegoRaytheon, a major American defense contractor just announced they will be acquiring Websense for 1.9 billion dollars. You can find more on the announcement from reuters.com HERE or from the bloomberg.com post HERE. Below is from the bloomberg post.

Raytheon Co. agreed to acquire Websense Inc. from private-equity firm Vista Equity Partners LLC for $1.9 billion and plans to combine it with its cyber-products unit, people with knowledge of the matter said. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

The Leap Second Impact On Cisco Products

leapsecondSome people are starting to freak out about Leap Second like it is the next Y2K, which is strange. Just like Y2K, there is a fear that systems will crash due to time adjustments. The reality of it is yes, some systems will need to be patched or adjusted, but there is no reason to stock up on water and prepare for dooms day. Manufactures just dealt with this in June 2012 and will be prepared again this June. For those not familiar with Leap Second, this will be the 26th adjustment since 1972. For more information, check out an article on wired.com HERE.

Cisco published a Leap Second page HERE showing which products could be impacted by Leap Second and what is being offered to prepare prior to June 30th. This page will continue to update as we approach June so check out which products you own and how they may be impacted.  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

How the U.S. thinks Russians hacked the White House

hacked

Washington CNN posted about a recent breach of a unclassified system at the White House HERE. In summary, it is believed Russian hackers accessed a system that is considered unclassified yet contained some sensitive information such as the president’s schedule. The original article can be found below.

Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)