by Taylor Smith | Sep 15, 2017 | Phishing
Is the ability to access a critical application using only a username and password a security red flag? In a word: Yes. Just ask the many folks who have recently had their bitcoins stolen because they weren’t adequately protected by multi-factor authentication....
by Taylor Smith | May 16, 2017 | InfoSec Strategies
On May 12th, 2017 cyber security professionals watched as the world was hit by the largest-scale ransomware attack to date. The ransomware, called WCrypt (aka WannaCrypt, WannaCry, WanaCrypt0r), spread rapidly. By encrypting files and demanding ransom for the...
by Taylor Smith | Apr 27, 2017 | InfoSec Strategies
Editor’s Note: This post was originally published in April 2015 and has been updated for accuracy and comprehensiveness. “Web cookies.” We see this term thrown around online quite a bit, whether it be in dialogue boxes requesting permission to use them, or site...
by Taylor Smith | Apr 12, 2017 | InfoSec Strategies
On March 7, 2017, the self-described “not-for-profit media organization” and whistleblowing website WikiLeaks began releasing the Vault 7 series of documents, which allegedly contain details about activities and capabilities of the CIA to conduct electronic...
by Taylor Smith | Feb 23, 2017 | InfoSec Strategies
In today’s highly connected world, it’s difficult to leave our office email and other key work applications behind. More and more of us take work wherever we go via mobile devices like smartphones and tablets. And our employers appreciate that we’re often more...