Posted on April 29, 2014 by David Jevans in Blog
The Beginners Guide to Bring Your Own Device (BYOD)
Imagine this scenario. John, an employee of your business, is having a typical morning at work. It's 9:15 a.m., as he's checking his morning emails. Oddly, he gets a notice from the HR department as...
Posted on April 9, 2014 by David Jevans in Blog
The Best Information Security Resources on Google Plus
Lately, we've been unraveling the top security resources to follow — including the best security experts on Twitter and the best security blogs to read — as it's helpful to discover experts on mul...
Posted on March 24, 2014 by David Jevans in Blog
12 Must-Have iPhone Security Apps to Protect Your Data
For the first time in history, people spent more time on their mobile phones than on desktop computers in 2013. As a result, the necessity for phone security is increasingly important. A compromised d...
Posted on January 22, 2014 by David Jevans in Blog, security
10 Security Blogs You Should Be Reading
With security the top IT concern for companies, it's critical that professionals stay current with breaking security news. Any business that leverages technology should understand what it can do to pr...
Posted on January 14, 2014 by David Jevans in Blog, security
The Biggest Security Breaches of 2013
In 2013, millions of accounts were compromised. Customers suffered and businesses lost millions of dollars due to the massive security breaches that took place. However, these security breaches are on...
Posted on November 20, 2013 by David Jevans in Blog, security
100 Security Experts to Follow on Twitter
As the worldwide security technology market is forecasted to grow 28% by 2016, according to Gartner, companies are continuing to strengthen their security technologies. With security being the p...
Posted on August 5, 2013 by David Jevans in Blog, security
“Good” Trojan Horse???
Dove, a maker of soap, released a Trojan into the art world. This Trojan horse malware tampers with Photoshop files, and attempts to educate artists that modifying body images for advertising is "wr...
Posted on June 8, 2013 by David Jevans in Blog, eCrime, security
A Very Sophisticated Android Malware
Our friends at Kaspersky Lab have posted an analysis of the Android Trojan Backdoor.AndroidOS.Obad.a
This looks like one of the most sophisticated malware samples ever on the Android platform. It ...
Posted on May 19, 2013 by David Jevans in Blog, security
How To Attack And Evesdrop On An Open WiFi
As users become increasingly mobile, on their Android devices, iPhones and iPads, they are using more and more WiFi networks in more and more locations. The BYOD (bring your own device) trend only mak...
Posted on February 19, 2013 by David Jevans in Blog, security
Using Google Docs for Spear Phishing
Spearphishing is one of the most dangerous of all the Advanced Persistent Threats. It is basically a targeted attack against a single user, or a small group of users, in order for the attacker to gai...
Posted on February 1, 2013 by David Jevans in Blog, eCrime
Identity Theft and Drugs Go Together
It's not the first time that I have heard of this. Police investigations are increasingly turning up links between traditional drug gangs and online identity theft rings. Here is a bulletin I just r...
Posted on January 24, 2013 by David Jevans in Blog, security
Barracuda Networks Devices Contain SSH BackDoor
Apparently tens of thousands of Barracuda Networks devices (VPN, web filters, spam filters) are configured to listen for SSH connections from various IP address ranges, without decent authentication. ...
Posted on December 6, 2012 by David Jevans in Blog
Click Here to Send SMS Spam
Today I received this marketing email from a well-meaning company that plans to bombard your SMS text message inbox with spam.
"Mobile Commons is an award-winning text messaging and CRM platform that...
Posted on December 6, 2012 by David Jevans in Blog
Websites Pushing Fake MDM Profiles To Take Over iPads
In the last week I have encountered 3 websites that are trying to take over control of iPads by pushing Mobile Device Management (MDM) profiles on to the device.
iPhones and iPads are much more secur...
Posted on November 14, 2012 by David Jevans in Blog, eCrime
FBI Warns Against Smartphone Android Malware
The FBI's Internet Crime Complaint Center has been warning banks and their customers this month about malware that is targeting smartphones, particularly Android devices, to steal online banking crede...
Posted on October 16, 2012 by David Jevans in Blog, security
Data is the New Oil
"We're able to view just everything that they do," Bill Diggins at Verizon Wireless told an industry conference earlier this year. "And that's really where data is going today. Data is the new oil."
Posted on April 9, 2012 by David Jevans in Blog, eCrime, security
The Android Malware Race Begins
Researchers at NQ Mobile and North Carolina State University have found Android malware circulating in the wild that appears to me to be test code by attackers to see how they can exploit vulnerabili...