How to derail a Business Gmail Spam bomb

spam bomb

Last Friday morning an East Coast client (ECC) woke up to find her Gmail business account pummeled with more than 40,000 spam emails—with approximately 150-250 emails bypassing Google’s spam filters to cut up her inbox—this ongoing spam deluge was no laughing matter. With business email delayed and spam consistently pouring in—ECC’s ability to conduct business on Friday was 100 percent crippled.

It flooded my inbox with spam (woke up with 50 spam messages that made it to my inbox and pr...

Read More

You’ve been hacked —what should you do next?

hacked

I’ve been hacked a few times, and it is a terrifying position to be in. The last time I recall a major hack was back in 2011 gratis a Malaysian hacktivist. It is unclear how the attacker procured the password to an old Gmail account — that I rarely used — but it was most likely tied to my use of the same weak password across multiple websites. Though these ancient accounts had been long forgotten by me, they morphed into the mode of unrestricted access for the attacker.

Armed with the ini...

Read More

Ransomware: How being prepared and proactive foils the plot

Ransomware

Since the advent of CryptoLocker in 2013, file-encrypting ransomware has become a scourge on the cyberthreat landscape. Whether it is delivered via an email/phishing/spam campaign, a drive-by download, malvertising or a browser exploit kit. Those who are unprepared for this type of attack often pay the ransom or lose all their files. While those who are both prepared and proactive are able to escape the ransom and restore their files via backup.

Ransomware not only poses a threat risk to indivi...

Read More

Young Darknet wannabe hackers — listen up!

young Darknet hackers

On Sunday, Onur Kopçak, a 26-year old Turkish hacker was sentenced to 135 years for stealing 11 peoples credit card information and selling it to other cybercriminals. With the additional sentencing of 199 years from a 2013 conviction that includes access device fraud, identity fraud, website forgery and wire fraud—this young hacker has a sentence of 334 years and is currently incarcerated in the Osmaniye prison in in the southern Adana province,Turkey.

On the U.S...

Read More

The top 5 IT security threats for 2016

off the ledge security

IT security threats for 2016 will be amplifying many of the cyberthreats that we have seen prevail throughout the year, while adding more emphasis to stealth threats. Ransomware will become hotter with threat actors and kiddie scripters alike, taking full advantage of streamlined and automated ransomware that promise lucrative financial gain.

It will be a year where we find out that our health care data does not primarily exist within the hub of the health care industry—but is actually shared o...

Read More

I just lost my job today. . .

jobless

Updated on January 7, 2015: On Tuesday afternoon while driving to Grants Pass, I received a phone call from my ex-boss about this blog post. I was basically told that my post here and posts on social media was causing great distress to the remaining employees and why would I want to do that? Why would I want to make people lose their livelihood? I began to feel guilty for creating so much distress for the remaining employees...

Read More

Living off the land: A security threat to your data

Living off the land- a security threat to your data

Early in September, Dell SecureWorks Counter Threat Unit™ Special Operations (CTU-SO) issued an alert about how threat actors are using sophisticated attacks via implementing a company’s own tools to compromise and steal data. This particular alert piqued my curiosity.

CTU-SO further elaborated that in the past year “the threat actors accessed the target environment using compromised credentials and the companies’ own virtual private network (VPN) or other remote access solutions...

Read More

Security: 11 tips to protect your data while shopping

security 11 tips to protect your data while shopping

The shopping season is about to erupt in full swing beginning on Black Friday. Many retailers are even extending their Cyber Monday sales to be cyber week sales. This is the time when consumers should taking additional precautions to protect personal data on their devices. 2015 has been the year of the data breach, and it is now a common occurrence in today’s information security threat landscape.

A few years ago, one of the biggest retail store data breaches occurred on Black Friday...

Read More

The Darknet Hell Forum Timeline Revisited

Darknet Hell forum web

Back in April of this year I wrote about the AdultFriendFinder data breach: Hacked! How safe is your data on Adult Sites? I did not mention the name of the hacked site because I was worried that I could potentially face legal repercussions. So, I sat on a leaked database of almost 3.9 million unique email addresses that exposed age, gender, race, sexual preferences, and more   until the British TV station, Channel 4 revealed the breach in May.

After the media attention settled down, my Da...

Read More