The Latest in IT Security

1

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their network. Breaking TLS is typically accomplished by loading an inspection CA certificate that dynamically generates certificates by your TLS inspection device. The public key from this CA is loaded into all clients on the network.

Read more ...

1

Over the past few weeks, cybersecurity seemed to steal the spotlight everywhere in world news. A major hotel chain saw a thousand hotels confirm a credit card breach, a major patch from Microsoft, Google fixing a phishing vulnerability within Chrome and our old friends the Equation Group making the news at six and 11.

Read more ...

1

In late March when I got an unsettling message on my Gmail account: “Warning: Google may have detected government-backed attackers trying to steal your password.”
Google sends them out when it detects a “government-backed attacker” has attempted to hack an account through phishing or malware.

Read more ...

1

On Tuesday, Gizmodo published a story about how easy it was to get Trump Administration officials and associates to click a Phishing link. In order to do this, the Gizmodo Special Projects Desk developed a fake Google Docs email, complete with a false sign-in page.

Read more ...

Categories

WEDNESDAY, MAY 24, 2017

Featured

Archives

Latest Comments

Social Networks