Archive for the
‘Uncategorized’ Category

A New Way for Phishing Over the past year Phishing sites have been increasingly using HTTPS.  As HTTPS begins more popular in general this is not entirely a surprise; but, the increase is more than expected.  Further, HTTPS is not necessary for a phishing site to function.  Towards the end of 2017 a quarter of […]

The Dark Web A dark web monitoring firm called 4iQ has discovered a mass of data on the dark web.  In simple terms the dark web is areas of the internet that are not indexed by search engines and so need special ways to reach the site.  It is also much harder to track people […]

What is Ransomware? Ransomware has been in the news a lot lately. Ransomware is malicious software that encrypts the data on a victim’s computer making them inaccessible until a ransom is paid to the attacker. The success of these attacks means we are likely going to be seeing a lot more of it.  One of […]

Meltdown and Spectre Processing chips are a fundamental part of functioning computer.  Rarely do we see flaws in such integral hardware.  Now two separate flaws have been found that appear to impact nearly all processing chips.  Nicknamed “Meltdown” and “Spectre” these are flaws that go all the way down to the architecture of the chip; […]

Second Hand, Could it be Tampered With? Beware of the deal too good to be true when it comes to internet connected devices.  For many things buying second hand is a great way to get a deal.  When it comes to your internet devices you should be a little more careful.  A compromised device will […]

A Infrastructure Attack A new Trojan virus was found. This virus targets critical infrastructure.  Exact details of the attack have not been given due to the nature of the event.  There is some information that we do know.  First the virus did cause an outage, but not in a way it was likely intended.  Second, […]

The Focus on Prevention Cyber criminals and cyber threats are always evolving.  For many businesses cyber defenses focus purely on prevention, stopping an attack from happening.  While this is good, often it is just not enough.  The reality is that in a more and more complex cyber world it can be nearly impossible to prevent […]

Malware too tough to die It’s been around for a long time, since early 2012, and it’s attacking in force once again.  Called Necurs, it is now possibly the largest active botnet.  Botnets expand to secretly takeover target devices allowing a master device to take control.  With over five million zombies (the term for infected […]

New Phishing Attempts Several new Trojan phishing attempts are making the rounds using some old and some new ideas.  Phishing attempts typically attempt to trick a victim into entering their credentials into a fictitious website that mirrors a real one in an attempt to gain personal data or access to accounts.  The new phishing attempts […]

Targeting Phone Wallets With the ever climbing value of cryptocurrency, phone wallets are gaining popularity. They offer an easy way to monitor, buy, and sell these digital currency.  Recently, the most popular, Bitcoin reached a value of over ten thousand dollars.  As a result, this makes for an enticing target.  The rise in appeal has […]

2
11
image
https://protocol46.com/wp-content/themes/blake/
https://protocol46.com//
#1771b9
style2
scroll
Loading posts...
/home/p46webadmin/public_html/
#
on
none
loading
#
Sort Gallery
https://protocol46.com/wp-content/themes/blake
on
yes
yes
off
Enter your email here
on
off