Year: 2018

Home / 2018

ALERT: Fax Machines Targeted By Hackers

Hackers are targeting your old fax machines, Israeli cybersecurity firm warns Check Point: Security flaws in 45 million business fax machines worldwide could be used as a backdoor into otherwise protected networks LONDON (AP) — What could be less threatening than the old office fax machine? Nothing. That’s precisely why it’s used as a backdoor...


Penetration Testing vs. Vulnerability Scanning

I often see promotional emails offering penetration testing for a ridiculously low price. This should be a red flag to anyone that receives something like this. What they are actually selling is usually a vulnerability assessment and that is quite a different thing than a true penetration test! It is not uncommon for someone in...


Russian Phishing Techniques – How did they get caught?

  On Friday, July 13, Special Counsel Robert Mueller, as part of his investigation into interference with the 2016 presidential election, charged 12 Russian military intelligence officers with conducting “large-scale cyber operations to interfere with the 2016 U.S. presidential election.” The indictment contains a surprising amount of technical information about alleged Russian cyberattacks against a range of U.S....


How Much Does a Penetration Test Cost?

Ethical hacking is a great way to discover where your business security fails. Your company may have the technology in place to prevent data theft, but is it enough? How do you prove it? The most accurate way to know if you’re safe from a hacker is through live penetration testing, also called pen testing,...


Cryptocurrency Mining Malware Infected Over Half-Million PCs Using NSA Exploit

2017 was the year of high profile data breaches and ransomware attacks, but from the beginning of this year, we are noticing a faster-paced shift in the cyber threat landscape, as cryptocurrency-related malware is becoming a popular and profitable choice of cyber criminals. Several cybersecurity firms are reporting of new cryptocurrency mining viruses that are...

  • 1
  • 2