<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1626328370711236&amp;ev=PageView&amp;noscript=1">
banner-blog.jpg

blog

Stop Phishing With Technology AND Training

Posted by Jay Kelley on Aug 17, 2017

While Black Hat USA 2017 ended three weeks ago, I wanted to share my thoughts and experiences on my very first Black Hat USA 2017 after being in security for 15+ years. 

Read More

Tags: Black Hat Conference, black hat, Ichthyology, cyber attacks, cyber theft, cybersecurity, cyber training, authentication and application security, phishing training, phishing attacks, credential theft, malware, ransomware, spearphishing, isolation

Ransomware: Let’s End It

Posted by Greg Maudsley on Jun 22, 2017

The world could rid itself of ransomware overnight if we, as a society, could collectively agree to stop paying ransom. If there was a 100% certainty that they would not get paid, attackers would simply shift their attention elsewhere. But the fact of the matter is people do pay criminals to release their critical data. According to a new survey, 52% would pay up if their computer were taken hostage by ransomware. Why is this?

Read More

Tags: ransomware, bitcoin, bitcoins, browser-based attacks, cyber theft, cyber threats

10 Tips to Reduce Malware Threats

Posted by Kowsik Guruswamy on Mar 6, 2017



Half of the web is vulnerable to malware, as we measured recently in our State of the Web research report, making it clear that merely visiting a legitimate web site is risky.

Read More

Tags: malware, malware vulnerabilities, cybersecurity, cyber theft, cyber threats, ransomware, Google Chrome, security strategy, security, phishing, anti-phishing, bitcoins, credential theft, isolation

Browsing the Web is a Leap into the Unknown

Posted by Kowsik Guruswamy on Dec 13, 2016

Users must recognize that they are taking a significant risk when connecting directly to the Internet. The new Menlo Security State of The Web report reveals that nearly half (46%) of the Internet’s top 1 million web sites, as ranked by Alexa, are risky.  

Read More

Tags: state of the web, security strategy, cybersecurity, isolation, cyber theft, anti-phishing, malware, malware vulnerabilities, blog

Yes Muni, You Can Limit Ransomware Attacks

Posted by Peter Lunk on Dec 1, 2016

The San Francisco Bay Area was enjoying a US Thanksgiving holiday weekend when ransomware hit its municipal transportation agency, locally known as Muni. Over 900 office computers were affected, with Muni data locked up as the hacker demanded 100 bitcoins, or roughly $73,000, which the San Francisco Municipal Transportation Agency (SFMTA) never considered paying, according to the San Jose Mercury News.

Read More

Tags: ransomware, isolation, cyber theft, cybersecurity, bitcoin, San Francisco, Muni, malware, anti-phishing, remote browsing

Mass Downloads of Documents Still Include Malware

Posted by Greg Cross on Oct 14, 2016

A new and rapid growth trend during the U.S. political season is that various treasure troves of leaked documents now await  the masses on the Internet, including via sites like WikiLeaks and "Guccifer 2.0’s” latest Wordpress blog. 

Read More

Tags: malware, pdf, phishing, risk, cybersecurity, security, isolation, malicious code, malware vulnerabilities, email attachments, cyber theft, ransomware, security strategy

Connect with us

Lists by Topic

see all

Recent Posts

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.