2017 Cybersecurity in Review

Jordan Kadlec

 

Read More

Why You Should Change Your Passwords

Jordan Kadlec

Almost exactly a year after Yahoo announced they suffered the largest data breach to-date, officials corrected the estimated number of users affected in a statement released on October 3rd. The…

Read More

Security Breach Notification Laws

Jordan Kadlec

As of now, 48 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have implemented legislation that requires private or government entities to notify individuals if they have…

Read More

March Ransomware in Review

Jordan Kadlec

March was a month where a lot of small ransomware variants appeared but never came to fruition. There was, however, an update on CryptoLocker making its return, Cerber added a couple of new features,…

Read More

Double Agent: The Zero-Day That Could Last for Months

Jordan Kadlec

A zero-day attack named Double Agent has been discovered that exploits a 15-year-old feature in Windows from XP through Windows 10. The attack has the ability to take over antivirus software on…

Read More

Spear Phishing Examples

Jordan Kadlec

Phishing is one of the most common attack vectors hackers use to initially infiltrate a user’s system. Phishing is an attempt to obtain user credentials, financial data, or other sensitive…

Read More

Top 7 Revelations of Vault 7

Jordan Kadlec

WikiLeaks dropped a bombshell on Tuesday, March 7th when it began a new series of leaks on the U.S. Central Intelligence Agency. Code-named Vault 7, Year Zero is the first series and is comprised of…

Read More

Advanced Persistent Threats and Ransomware

Jordan Kadlec

Advanced Persistent Threats (APT) and ransomware have been the most dreaded types of malware over the last couple of years. While there are clear and distinct differences between APTs and ransomware,…

Read More

February Ransomware in Review

Jordan Kadlec

Although February was a short month, there certainly wasn’t a shortage of new ransomware variants. While there were several variants that will probably never make it into circulation, there was some…

Read More

Zero-Day Attack Examples

Jordan Kadlec

Stuxnet is known as the world’s first cyber weapon.  Stuxnet was used to break Iran’s uranium enrichment centrifuges when it was feared they were producing chemical weapons. While there’s no proof as…

Read More