JOB SEARCH
Tim&Larry

Looking for Employment? Don’t Find Yourself a Victim of Identity Theft

Here is the weekly roundup :

Looking for Employment? Don’t Find Yourself a Victim of Identity Theft
Employment seekers beware: crooks are looking for your identity and don’t have far to go. Many disguise themselves as Job Brokers or Placement Agencies and even have websites to trick you into uploading your resume and entering detailed contact information.

Cybercriminal Gang Targets Encrypted Email Providers
Private email providers offering enhanced encryption have been at the receiving end of crippling DDoS attacks lately and it has been revealed that the extortionist cybercriminal group behind the strikes are called the Armada Collective.

Microsoft Invests Big Money in Cybersecurity
Microsoft CEO Satya Nadella has revealed that the software giant spends upwards of $1 billion every year in security research and development.

Cybersecurity Crisis Communications: Having a Plan is the Best Plan
Most companies, and poeople within them, live in a denail that they will not be the next target. The reality, however, points to the dark truth: it will happen sooner or later. Being prepared beforehand is the only way to address the issue when it does arise.



Amazon Switches on Two-Factor Authentication
Some might say “it’s about time” and they may be right. The world’s biggest online retailer has just upgraded its basic security for millions of Amazon customers by enabling two-factor authentication.


Techniques of Malware That Struck Sony Pictures Revealed
An independent security firm has revealed the sophisticated techniques of the infamous Destover malware, widely known as the Trojan that affected Sony Entertainment’s network and computers.




ProtonMail Is Back after a Week of DDoS Attacks
Encrypted email service provider ProtonMail is back after a week of relentless crippling DDoS attacks that crippled the Switzerland-based company with speeds of over 100Gbps.


Interesting Reading From Around the Web:

Both FBI And Carnegie Mellon Are Now Denying 'Accuracy' Of $1 Million Tor Surveillance Payment
Last week the director of the Tor Project, Roger Dingledine, made a bold but unsubstantiated claim that users of the Tor anonymizing network were unmasked in the first half of 2014 by a technique supplied to the FBI by Carnegie Mellon University (CMU) researchers. Both have now labelled those claims inaccurate and it appears CMU submitted to a subpoena, though it isn’t admitting to anything.


Paris Terror Attacks Stoke Encryption Debate
U.S. state and federal law enforcement officials appear poised to tap into public concern over the terror attacks in France last week to garner support for proposals that would fundamentally weaken the security of encryption technology used by U.S. corporations and citizens.


4 Top Holiday Season Scams
Black Friday and Cyber Monday mark the beginning of holiday shopping season – as well as holiday fraud season. With many consumers spending more than usual this time of year, cybercriminals will no doubt try to take advantage of them through scams such as phishing emails, quick money schemes and bogus gift cards. Make sure you do not fall victim to them.



Upcoming Events:


The Next Generation of Incident Response

We are thrilled to present How to Prevent Personal & Corporate Hacking. A premiere panel featuring speakers with experience in the FBI, Secret Service, digital forensics, and more. Come learn how to protect yourself on both the personal and corporate level in our new media-rich era an earn 2 CPE credits.

FOR 50% DISCOUNT, PLEASE USE THE FOLLOWING CODE: LIFARS50 December 3, 2015, New York, NY



Find Out More



LIFARS at the Cybertech 2016: The Anatomy of an APT Attack

Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States.

Wondering what an APT attack looks like under the microscope? In this 3 hour workshop, we will examine the process of response to an APT attack in some real-world scenarios. We will also elaborate on the process of detonation of malware, the forensic investigation, and more.

FOR A 10% DISCOUNT, PLEASE USE THE FOLLOWING CODE: LIFARS cybertech20 January 26-27, 2016, Tel Aviv, Israel



Find Out More


On-Demand Webinar:



Best Practices for Cyber Security Incident Response (IR)

Whether you are a large or small company building an effective Incident Response (IR) may seem daunting in the wake of the ever increasing sophistication of threats. In this webinar we will cover the best practices of an effective Incident Response for cybersecurity.



Register Now






The First 24 Hours After a Breach

A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.

Watch Webinar







PowerTalk: The 2016 B2B Cybersecurity Landscape

Join Kaspersky Lab’s Brian Burke and Jon Whitlock for a look forward into industry predictions for the 2016 security landscape and the steps you need to take to protect your valuable data from targeted attacks. This Webinar will help you: -Understand trends and data on the latest cybersecurity threats -Identify weak spots in the ever-expanding perimeter -Prepare your business for the upcoming year

Watch Webinar




Featured Content:



Cybersecurity While Traveling

The majority of us travel quite frequently, and yet we give little thought to how we keep our identity and data safe while doing so. This guide will provide you with some basic rules to follow when traveling that will significantly increase your security and privacy.



Free Download






Business Continuity Planning and Disaster Recovery

Disasters can hit your organization at any time. But, as this new ebook from SC Magazine reveals, there are tools and strategies to help get formal security plans and policies in place to best serve your enterprise when, during and after a data breach strikes.



Free Download



Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.