The Latest in IT Security

1

We report the results of a field experiment where we sent to over 1200 university students an email or a Facebook message with a link to (non-existing) party pictures from a non-existing person, and later asked them about the reasons for their link clicking behavior.

Read more ...

1

By now, you may be aware that many of the most devastating hacks that have occurred in recent history—the Democratic National Committee (DNC), Yahoo, the W-2 scam—have been launched from a base of information or access garnered by sending a poisoned email with tailored details to a specific individual.

Read more ...

1

Recent coverage of the latest ransomware and phishing attacks makes one thing clear: You’ve got to keep your operating system up to date. But that recommendation, while important, may not get to the root of the problem. Making sure you’ve got the latest Windows updates prevents the spread of ransomware such as WannaCry, after it’s already infiltrated your company.

Read more ...

1

As the use of TLS by malware and phishing increases, some security practitioners are seeking solutions to break TLS so they can monitor all traffic in and out of their network. Breaking TLS is typically accomplished by loading an inspection CA certificate that dynamically generates certificates by your TLS inspection device. The public key from this CA is loaded into all clients on the network.

Read more ...

Categories

TUESDAY, JUNE 27, 2017

Featured

Archives

Latest Comments

Social Networks