The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of you might already be familiar with the fake Center for Disease Control and World Health Organization emails, we have observed an increase in […]
Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the market. Over the last month, the use of this platform has spiked amid the Covid-19 pandemic as businesses, schools, and governments transition to remote work environments.
ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought it was worth the effort to provide a quick breakdown of how ThreatLocker can enable this critical strategy for Australian Businesses.
The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability is discovered in Windows. Generally, by the time the vulnerability is public knowledge, Microsoft has released a security patch in Windows Update.
I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.
Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.
Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]
Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy.
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: “How can I make myself unhackable?” Seldom do they understand when I try to explain that there is no such thing as unhackable. The purpose of this guide is to help business owners better understand cyber risks and […]
ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk. https://www.clickorlando.com/news/text-compliments-part-of-app-marketing-plan-not-sex-trafficking
As computer games evolve, gaming businesses are no longer just focusing on better graphics. Game manufacturers are turning to the internet for better collaboration, game rooms, multi-person battles, and even a marketplace to buy and sell items in a virtual world.