Search Results for: Computer Fraud Page Remote Cyber Security Solutions Suite April 15, 2020 Blog Post AT&T Employees Plant Malware in Exchange For Money August 8, 2019 Two men bribed several AT&T employees to install installed malware and unauthorized devices on the company’s network in their phone... Page Proactive Security Services: Building Sustainable Cyber Resiliency February 16, 2019 Blog Post Mirai Botnet Hacker Ordered to Pay $8.6 Million in Damages October 29, 2018 The office of the US Attorney of the District of New Jersey has ordered 22-year-old former Rutgers University student Paras... Blog Post U.S. Senators introduce New Bill that sets IoT Standards for Federal Suppliers August 2, 2017 U.S. Senators are planning to introduce new bill that sets IoT standards for federal suppliers. Sens. Mark Warner (D-Va.), Cory... Blog Post ‘WannaCry’ Hero is Facing 4 New Federal Malware Charges June 7, 2018 The cybersecurity researcher widely credited with putting an end to last year’s unprecedented WannaCry cyberattack is facing four new federal... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post Cybersecurity Is Ever More Critical Since The Hacker Group Evil Corp Still At Large November 10, 2020 The Russian hacker group, commonly known as Evil Corp, appears to be running a new ransomware strain called WastedLocker. According... Blog Post Biometrics and Cybersecurity May 21, 2020 Biometrics is a center piece of security. Technology makes a lot of things easy, but at the same time security... Blog Post Fake Amazon Representatives Caused Phone Scam in England January 29, 2020 Scammers in England set up a complex hoax, pretending to be Amazon representatives and called up Amazon users. They claimed... Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to... Blog Post Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set... Blog Post Former Rutgers Student Pleads Guilty to Creating Mirai Botnet December 15, 2017 A former Rutgers university student is among three men who pleaded guilty to creating the dreaded “Mirai” botnet that crashed... Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...
Blog Post AT&T Employees Plant Malware in Exchange For Money August 8, 2019 Two men bribed several AT&T employees to install installed malware and unauthorized devices on the company’s network in their phone...
Blog Post Mirai Botnet Hacker Ordered to Pay $8.6 Million in Damages October 29, 2018 The office of the US Attorney of the District of New Jersey has ordered 22-year-old former Rutgers University student Paras...
Blog Post U.S. Senators introduce New Bill that sets IoT Standards for Federal Suppliers August 2, 2017 U.S. Senators are planning to introduce new bill that sets IoT standards for federal suppliers. Sens. Mark Warner (D-Va.), Cory...
Blog Post ‘WannaCry’ Hero is Facing 4 New Federal Malware Charges June 7, 2018 The cybersecurity researcher widely credited with putting an end to last year’s unprecedented WannaCry cyberattack is facing four new federal...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post Cybersecurity Is Ever More Critical Since The Hacker Group Evil Corp Still At Large November 10, 2020 The Russian hacker group, commonly known as Evil Corp, appears to be running a new ransomware strain called WastedLocker. According...
Blog Post Biometrics and Cybersecurity May 21, 2020 Biometrics is a center piece of security. Technology makes a lot of things easy, but at the same time security...
Blog Post Fake Amazon Representatives Caused Phone Scam in England January 29, 2020 Scammers in England set up a complex hoax, pretending to be Amazon representatives and called up Amazon users. They claimed...
Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...
Blog Post Authentication, Authorization & Accounting (AAA) April 17, 2020 Cisco ME 2600X Series Ethernet Access Switch Software Configuration Guide stated “AAA is an architectural framework for controlling a set...
Blog Post Former Rutgers Student Pleads Guilty to Creating Mirai Botnet December 15, 2017 A former Rutgers university student is among three men who pleaded guilty to creating the dreaded “Mirai” botnet that crashed...
Blog Post Threat actors exploiting the novel corona virus epidemic (COVID-19) March 19, 2020 As the WHO has declared COVID-19 to be a global pandemic, we have seen a large increase in the exploitation...