Anatomy of Cryptophishing – Hydro Project

Cross-posted to “AdventuresInCyberSecurity.com” and “BecomeACyberSecurity.Expert” Logo is stolen from the real Hydro Protocol folks. I get some interesting emails, and in particular, some interesting phishing emails. Most of them are quite poor, and fairly easy to spot, and the people constructing them don’t go through a lot of effort. I received one today that was […]

Read More Anatomy of Cryptophishing – Hydro Project

On Hacking Automated Trucks #cybersecurity #y2k #iot

Regarding this article from a post on Linked In: https://www.bizjournals.com/phoenix/news/2017/07/25/is-cybersecurity-the-y2k-of-this-generation.html Is #cybersecurity the #Y2K of this generation? This author seems to think so. This is telling: “Yes, that [hacking automated trucks] is possible, but the designers of these systems are aware of the issue and are putting measures in place to avoid it.” This completely […]

Read More On Hacking Automated Trucks #cybersecurity #y2k #iot

Malware via Email

I can tell just by looking what kind of malware this is likely to be. I imagine that many people don’t look forward to getting malware on their machines, but I do. It’s great – as a person who fights this sort of thing on a regular basis, the “enemy” is kind enough to regularly […]

Read More Malware via Email

Cybersecurity Trends for 2014 – Trend 6 – Big Data Becomes Huge Data with Things like SSL Visibility

Image from cxotoday.com. Cross-posted to the Blue Coat security blog. Apologies for the delay in getting this last post in the series out, but I recently got married! We’ve looked at five precious trends for this year and what they’ll mean in the Cybersecurity landscape: botclouds not botnets: the idea that physical machines are becoming […]

Read More Cybersecurity Trends for 2014 – Trend 6 – Big Data Becomes Huge Data with Things like SSL Visibility

Cybersecurity Trends for 2014 – Trend 5 – 3rd Party Security Requirements Increase

Image from ctvnews.ca. Cross-posted to the Blue Coat security blog. In the previous post, I discussed how the Deep Web was starting to surface. One of the things that shows that this will occur was the Target breach. The malware found in the Point-of-Sale (PoS) systems in the Target breach was using Tor to transmit […]

Read More Cybersecurity Trends for 2014 – Trend 5 – 3rd Party Security Requirements Increase