Yearly Archives: 2017

CSA Summit SoCal 2018

The full day Cloud Security Alliance LA Summit is a standalone event in the greater Los Angeles area on Thursday 6th December hosted by the CSA LA/Orange County chapters. We expect to draw around 200 well qualified attendees with an interest in cloud security from the local region. The theme is Commercial and Open Source…

Speaking today on IoT Security

With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic.  Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen.  These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down…

All they need is a click!

Clickbait malware sites “You No Longer Need To Be A Member To Shop In Their Stores” (1) “NASA Confirms Earth Will Experience 15 Days of Complete Darkness in November” (2) “First she did this, and then you won’t believe what happened!” If you visit any social media, news sites, or see advertisements online, you will…

DEF CON: a Glimpse into the Largest IT Security Convention!

The largest, oldest, and most well-known convention for all things IT Security is DEF CON, which is currently being held in Las Vegas, Nevada! DEF CON began in 1993 as the first hacking convention. It was originally brainstormed as a going-away party for Platinum Net, which was an old hacking network once based in Canada….

NotPetya: the newest Ransomware Threat

Another wave of ransomware has been hitting companies, hospitals, airports, banks, and government systems alike around the world, substantially within the Ukraine, but also affecting computers in France, Denmark, and within the US. Kapersky Labs reported earlier that more than 2000 attacks have been noted thus far. Like other ransomware, NotPetya has locked down computer…

Security for the SMB: Preventing a Business Nightmare

T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…

Wanna Cry? Updating your systems is crucial!

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…

The Race for Security: Zero Day Exploits

Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

The Tax Clock is Ticking

Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon….