Cyveillance - cyveillance.com - https://www.cyveillance.com
General Information:
Latest News:
Simulated Attacks Show C-Level Executives Can Make Easy Targets for Spear-Phishers 20 Aug 2013 | 01:01 pm
Wombat Security Technologies recently talked to Security Week about the on-going problem with executives falling for spear-phishing attacks. Wombat, which specializes in testing a company’s vulnerabil...
Increased DDoS Attacks: 19 Aug 2013 | 07:19 pm
What They Mean to Enterprise Companies, and Best Practices for Mitigation By Phil Annibale, Manager, Cyber Intelligence Division The frequency and size of Distributed Denial of Service (DDoS) attac....
Risks from Photo Geotagging 16 Aug 2013 | 04:58 pm
The Truth, The Hype and The Implications for Physical Security Teams A number of our Cyber Intelligence and Cyber Threat Analysts have been discussing a video that’s been making the viral rounds on s...
Google’s Bouncer and Apple’s Vetting Process May Not Be Enough to Stop Rogue Mobile Apps 16 Aug 2013 | 01:23 am
This blog is an update to our recent post about security measures designed to help prevent rogue mobile apps. Earlier this week, Palo Alto Networks announced that it had found an advertising company b...
China Reports Increase in Trojan and Botnet Attacks 25 Jul 2013 | 07:16 pm
During the past year we have heard countless reports of U.S.-targeted web attacks coming from China. Conversely, we don’t often hear about foreign attacks that target China. A July 4 article from CSO...
Securing User Privacy with HTTPS 17 Jul 2013 | 04:46 am
Image courtesy Zimpenfish. “All Sites Should Deploy HTTPS” Internet Security 101 teaches us that sites should use SSL to secure important transactions between visitors and websites. If any sort of t...
New Apple iOS and Android Security Measures are on the Way – But Will They Work? 12 Jul 2013 | 04:58 pm
Our last few blog articles about rogue mobile apps have highlighted some of the methods criminals use against mobile phone users, and ways consumers and companies can mitigate the risk of being attack...
Hidden Cost of DDoS Attacks: 24 Jun 2013 | 09:02 pm
Diminished Productivity as IT, Security Pros Fight Large, Sophisticated Assaults As we’ve seen in the past year, Distributed Denial of Service (DDoS) attacks have become so frequent that they’ve even...
“Safer” is a Misnomer in the World of Mobile Apps 20 Jun 2013 | 05:40 pm
The word “safer” implies that something was safe to begin with; however, when it comes to mobile apps, “safe” is a relative term. Although both Google and Apple have methods to weed out rogue apps tha...
The Year of Mobile Malware: 13 Jun 2013 | 03:58 pm
App Downloads Double, But Many are Dubious The Russian security research firm Kaspersky Labs recently discovered the most advanced Android Trojan to date. Dubbed “Backdoor.AndroidOS.Obad.a,” this ...