Training End Users to Defend Against Cyber Attacks
The title is from the refrain of a song that was popular many years ago, “Where have all the flowers gone” that was sung by Peter, Paul and Mary. I loved the folk music genre then and I still do today. The question, though, applies to cyber security and it was asked (in a wholly […]
Want Safe Cloud-Based E-Mail? I’m Avoiding Web Mail.
I was reminded of some cloud security issues recently while helping family restore their e-mail connectivity. Where they live, Frontier is pretty much the only practical choice for landline phones plus high-speed Internet. Their performance is quite good, and I have found them to have the most technically savvy customer service of any major provider […]
At The Waterhole
I learned something this week (end of May, 3013) and wanted to share it with you. I had not heard of waterhole attacks before and I think term is clever. First, a bit of background: waterhole attacks are related to spearphishing. Spearphishing is a targeted version of phishing. The idea is to customize and focus […]
It’s Always Phishing Season
Recent news reports have discussed the FireEye Advanced Threat Report for the Second Half of 2012, specifically the finding that “On average, a malware event occurs at a single organization once every three minutes”. That’s a shocking statistic to be sure, but to those of us in computer security, a big part of the issue […]