Tag Archives: hacking

Cyber Threats: Ransomware

WannaCry Ransomware

Cyber Threats: Ransomware In October 2016, I attended a SecureWorld conference in Bellevue, WA. The hot topic of the event? Ransomware. I realized that I had left ransomware out of my cyber threats series, hence this post. This one is going to be a bit different, however. I’ll be giving… Read more »

#CyberHeadlines: POS Hack

#CyberHeadlines: POS Hack Biggest financial breach ever in India As India’s tech industry booms, cybersecurity has been left to the wayside leading to the largest debit card breach India has ever seen. 3.2 million customer accounts were compromised, making their financial information vulnerable. This POS hack, The Economic Times reported, originated… Read more »

Cyber Headlines: Hacking Medical Devices

Cyber Headlines: Hacking Medical Devices In the ever-changing landscape of Cybersecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. As I was traveling, Dennis Skarr stepped in solo, with the… Read more »

The ABC’s of Cybersecurity: F- J

The ABC’s of Cybersecurity: F- J Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of… Read more »

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016

CyberSecurity Headlines: Global Hacker Groups, Mr. Robot, and Previewing Black Hat USA 2016 In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit… Read more »

CyberSecurity Headlines: Hack the Pentagon, North Korea and Pokemon Go

CyberSecurity Headlines: Hack the Pentagon, North Korea’s Cyber Army and Pokemon Go In the ever-changing landscape of CyberSecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. Today, I sit down… Read more »

Cyber Threats: Brute-force Cracking

cyber threats types of cyber attacks

Cyber Threats: Brute-force Cracking Brute-force cracking basically amounts to continually guessing a password until one gets it right, allowing entry to a site. It can also mean similar trial-and-error means of finding hidden pages. The most common method of brute-force attacks are dictionary attacks. A dictionary attack utilizes a password… Read more »

Cyber Threats: Phishing Attacks

cyber threats types of cyber attacks

Cyber Threats: Phishing Attacks Phishing Attacks are the primary vector for malware attacks and are usually comprised of a malicious e-mail attachment or an e-mail with a malicious link. Phishing e-mails typically, falsely claim to be an established or legitimate enterprise. Once the malicious attachment or link has been opened, users are… Read more »

Protected: CounterTack Partnership Announcement

Manpreet Wadan   July 5, 2016   Enter your password to view comments.

Cyber Threats: Advanced Persistent Threat Attack

advanced persistent threat

Cyber Threats: Advanced Persistent Threat Attack The goal of an advanced persistent threat attack (APT attack) is to maintain covert, ongoing access to a network. This allows hackers to continuously gather valid user credentials and access to more, and more, valuable information. An Advanced persistent threat attack aims to gather information rather… Read more »