On Friday, May 12 2017 a large scale cyber-attack known as “WannaCry” was launched targeting more than 230,000 computers in 150 countries affecting Britain’s National Health Service (NHS), FedEx, LATAM Airlines and other important companies around the world.This is certainly not the last time we’ll hear about this cyber-attack, here’s what you need to know…
Mon, May 15, 2017
Thu, Jan 05, 2017
In a world where billions of username/password combinations have been compromised by hackers, it is increasingly difficult to be certain that the sender of an email is the person that they claim to be. Masquerading and fictitious social accounts, copycat domains, online user groups, and rogue websites are becoming more common. These fraudulent online personalities and properties are often the launching pad for socially engineered attacks such as BEC schemes.
BEC attacks grew in sophistication and effectiveness in 2016, compromising businesses in every market -- leading healthcare organizations, an NBA team, financial institutions, the World Anti-Doping Association, to John Podesta and the Democratic National Committee. The cost of these attacks? Tens of millions of dollars, incalculable reputational damage and possibly an election....
Exploits driven by stolen or invented identities are a menace, and BrandProtect analysts believe that trend will continue in 2017. CISOs and Digital Governance teams need to prepare their company, and protect other companies from BEC and socially engineered attacks that are made using their identity or corporate personality.
Wed, Nov 23, 2016
Facebook and Twitter have been talking a lot about fake news recently.
And so have a lot of other people. Depending upon who you read, and who you believe, fake news played a major role in the recent presidential election. But fake news isn't limited to politics. Fake news, and its relatives, are some of the most vexing types of external cyber attacks facing corporations, institutions and enterprises.
“Fake news” can originate practically anywhere on the Internet -- through tweets, posts, blogs, wikis, discussion forums, chats, podcasts, digital images, video, audio files, advertisements and more. There are even official "citizen journalist" sides like CNN's iReport or reddit, where end-users can directly publish their views, or their content, without fact-checking, editing, or any other kind of content-curation.
This un-proctored, un-curated, un-fact-checked content creates a nightmare for enterprises. These are content-based cyber attacks that don’t touch company infrastructure at all. They exist completely outside the firewall, beyond the traditional perimeter. But even without touching the targeted company directly these attacks can have huge impacts on a company’s revenues, operations, and reputations....