So you have the latest in DDoS and WAF protection. You’ve ensured your company is protected against SQL injections and cross-site scripting, but then an employee clicks on a pop-up to win a free iPad and your network has suddenly been infiltrated with malicious code. What happened?
In analyzing the 2015 cyber trends, we have found that cyber attackers can effectively defeat IP-based defense systems by launching application-level attacks that originate from real – but dynamic – IP addresses. One of the most common variations of dynamic IP attacks is clickjacking.read more
In my last blog, I talked a little about the general principles of the cyberattack marketplace. Today, we will take a closer look at the Darknet. There is so much talk these days about the Darknet. It’s the stuff of crime novels – a hotbed of criminal activity where anything can be bought and sold.
While that is true, the Darknet also provides an anonymizing layer to journalists and activists around the world who fight for the freedom of information and privacy. It is often a place where they can securely and anonymously communicate with their contacts.read more
Public Transportation is the lifeblood of any economy and the circulatory system of modern day societies. From train, plane to automobile, the public transportation apparat is one of the core achievements in a highly functioning society. It includes everything from the roads, shipping ports and airports which are funded and maintained by public investments to wholly run publicly available train and bus systems.read more
David Storch is a Product Manager and Principal Consultant at Atos and a featured guest blogger
In a press conference in March 2015 Hillary Clinton said ‘When I got to work as secretary of state, I opted for convenience to use my personal email account… because I thought it would be easier to carry just one device for my work.’ This statement is interesting for many reasons, one of which is not how exceptional it is, but how unexceptional, and how well it summarizes the prevailing sentiment about personal devices and convenience. Any number of people in business or government could have made a similar statement–it represents the thinking of government, business and individuals all across the world. Note that what is being referred to as convenient isn’t using a personal device or of using personal email, but of having to ‘carry just one.’read more
The U.S. Senate is currently evaluating a bill that would require companies to break encryption under a court order. There is much controversy around this bill, in fact several organizations have already spoken out against it, including the CTA.read more
It’s 9:30am. You’ve gotten your morning coffee, checked your email, and now you are surfing the web when all of a sudden everything freezes. A message pops up on your screen saying:
“You have been caught accessing inappropriate content and your device will remain locked unless you pay $$$$$”
Ransomware is fast becoming the leading cyber concern for businesses in 2016. We are seeing new ransom tactics used daily to target companies from various industries and individuals worldwide. The potential harm is devastating.read more