IT Security Opinions | SC Media

Opinion

Limor Kessem

IoT App Status: Insecure

In my last post about IoT security, we discussed how lax consumer attitudes about securing devices and wearables could be a contributing factor to their insecurity. In this post, we will examine another angle: securing IoT devices on the application level. This time we’ll go straight to the source and look at what enterprise users…

Balancing Digital Transformation with Security

With 2017 in full swing, it is hard to ignore the impact that digital transformation has on today’s businesses. Across the globe, companies of all sizes are transforming their processes, workflows, and cultures in favor of digital interaction.  Some examples:  Small – Midsize Businesses Selling products and services online Creating mobile-friendly loyalty program and coupon…

Phishing from the Middle: Social Engineering Refined

Phishing attacks have long been associated with malicious emails that spoof well-known institutions in order to trick users into coughing up credentials to banks accounts, email accounts, or accounts for major online services. Phishing emails that exploit the good name of trusted brands familiar to users have also been known to deliver ransomware, backdoors, and…

xDedic: How black markets for hacked machines are making the job of targeted APT actors much easier

The rise and commoditization of underground marketplaces for selling and buying access to compromised corporate machines introduces a new reality for security professionals – one in which corporate machines, infected with malware that is generally accepted to be “untargeted” or “low corporate risk” and hence typically get de-prioritized for remediation by security operation centers, can…

jerome segura

Malvertising: the invisible enemy

For years, cybercriminals have leveraged malvertising, or malicious advertising, to deliver malware.  Without a doubt, malvertising is the ultimate weapon for criminals to gain access to a wide audience visiting popular websites, and at the same time be able to precisely target potential victims. And they can do all of this without being seen. Malvertising…

Next post in Executive Insight