e92plus Blog

CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems

Dec 8, 2017, 08:49 AM Ben Gane

The banking trojan known as DOWNAD (Detected by Trend Micro as DOWNAD family) first appeared back in 2008, where it managed to be one of the most destructive malware at the time, infecting up to 9 million computers and gaining worldwide notoriety. Despite being nearly a decade old...


Read More

The Holiday Shopping Season is no Longer Enough!

Dec 8, 2017, 08:45 AM Ben Gane

Not so many years ago, the pervasiveness and affordability of e-commerce unleashed a major havoc. Nevertheless, with the passage of time, business models based solely on online sales have started to experience limitations. Pure players started to lose ground to customers in search of a more...


Read More

Are Your Android Apps Invading Your Privacy?

Dec 8, 2017, 08:39 AM Ben Gane

Mobile devices are amazing tools that can enrich your life in many ways. Need to solve a problem…? There’s probably an app for that. As these devices mature, and as we weave them into our daily lives more, there is a cost tradeoff that you should be mindful of: “privacy vs convenience.”...


Read More

Security the main obstacle to IoT adoption, decision makers say

Dec 7, 2017, 12:42 PM Ben Gane

The benefits of Internet of Things (IoT) solutions are widely recognized among IT leaders. Business efficiency, customer experience, and collaboration are among the key areas that typically see an uptick thanks to connected devices. But many decision makers are holding back adoption due to...


Read More

Why Your Web Filter Should Not Serve as a Second Firewall

Dec 7, 2017, 10:00 AM Ben Gane

Every enterprise today should be implementing a layered security strategy that utilizes multiple defensive layers to keep threats at bay. Two of these include a firewall appliance and web filter. At its most basic level, a customary perimeter firewall allows a security admin to open...


Read More

Putting the user experience first

Dec 6, 2017, 09:00 AM Ben Gane

In the early days of IT, computing departments lived in ivory towers, dispensing reports to users when the mainframe felt like it. As enterprise technology evolved, user needs remained in the back seat, with application development cycles that trickled out new features on an IT department schedule that...


Read More

Michigan man hacks government computer to jailbreak convicted friend; now faces 10 years in prison himself

Dec 6, 2017, 08:58 AM Ben Gane

A man from Ann Arbor, Michigan faces up to 10 years in prison for hacking into Washtenaw County government systems in an attempt to get a friend released early. A statement issued Friday by the Attorney’s Office in the Eastern District of Michigan...


Read More

Security Challenges in Smart Cities

Dec 6, 2017, 08:56 AM Ben Gane

The digital transformation of urban areas is in full swing, with some cities embracing smart technology faster than others. Built correctly, a smart city allows more efficient management of public services, from transportation and waste disposal to energy supply, traffic, parking, and street lighting. The...


Read More

2018’s Biggest Attacks Will Stem from Known Vulnerabilities

Dec 6, 2017, 08:54 AM Ben Gane

Trend Micro just released its annual predictions report for next year. In this, we outline 8 ways the threat landscape is expected to evolve in 2018. While the predictions touch on a wide range of issues – from IoT to cyberpropaganda – the underlying theme is this, 2018’s biggest attacks will stem...


Read More

Quantize or Capitalize

Dec 6, 2017, 08:52 AM Ben Gane

Last year, Forcepoint Security Labs blogged about the Quant Loader – a Trojan downloader previously seen being used to distribute Locky and Pony. We recently came across an active Quant loader administration panel hosted on a freshly registered domain which...


Read More
Back
to Top