Commissum

malware


Festive Security Tips to Tackle a Sleigh Full of Business Risk



Festive Security Tips to Tackle a Sleigh Full of Business Risk

It’s that time of year again – snow stubbornly refuses to fall on the rooftops as offices wind down and prepare for their respective office parties (ours was a blast – photos on our Twitter and LinkedIn!) Everyone has a lot on their plate during the … |More

Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight



Thoughts on Threats #2 – Web-based Attacks Hidden in Plain Sight


Back in August, we kicked off the Thoughts on Threats series with a look at the top-rated threat in ENISA’s Threat Landscape study from 2015. In this instalment, we’re heading down the list to the number two spot for a closer look at one of the web’s … |More

Thoughts on Threats #1 – Malware Mayhem



Thoughts on Threats #1 – Malware Mayhem


Cyber threats come in many shapes and sizes, and can strike at any time. The widespread adoption and use of the Internet has led to an increase in the threats posed to organisations and individuals alike, and the opportunities available to those looking to attack.

On … |More

Ransomware – Practical Tips in a Straightforward Manner



Ransomware – Practical Tips in a Straightforward Manner



No doubt the evolution of ransomware remains to be a hot topic among businesses and the security community in 2016. Cybercrime ecosystems remain in place, providing easy access to tools and exploit kits to carry out crime – so here we are, trying to tackle the … |More

Malvertising – the Colossal Squid of Cyber Attacks!



Malvertising – the Colossal Squid of Cyber Attacks!

Lurking deep in the depths of legitimate online websites is malvertising, a lesser known but just as insidious type of malware. Its tentacles spread deep and wide across the internet. Websites you visit every day have been compromised. YouTube, Yahoo and Spotify – to name a few!

According to the … |More

Apple App Store – Is It Still a Safe Haven?



Apple App Store – Is It Still a Safe Haven?

One of the most trusted tech giants Apple has recently experienced a cyber attack that affected Apple Store apps used on both iPhones and iPads in China.

Hackers created a genuine looking fake version of Apple’s software for building iOS and MAC apps, Xcode. App developers were a main target … |More

Drinkman – a Contributor to “the Biggest Breach in US History”



Drinkman – a Contributor to “the Biggest Breach in US History”

Russian national Vladimir Drinkman has pleaded guilty to participating in a major hacking scheme that resulted in the theft of millions of credit card numbers and millions of dollars in damages. He was arrested in the Netherlands in 2012: Drinkman fought extradition to the United States from a prison there … |More