Firewall Chats, Ep. 5: Scams, Malware, and Phishing Attempts

By | December 15th, 2015|Business Security, Firewall Chats|

Today airs the final episode in our pilot podcast series! To wind down the last few days of 2015, we sat down with Adam Dolby, Encap Security’s vice president of business development. Prior to joining Encap Security, Dolby was focused on banking, ATM networks, and card processing. His expertise lies within multi-factor authentication, security, and [...]

Ransomware in Review

By | November 24th, 2015|Business Security, Malware and Scams|

One of the scariest cyber security trends of 2015 was the evolution and uptick of ransomware attacks. Ransomware is a type of malware that, once installed on user’s device, will block access to the device until a ransom is paid to the cyber criminal to unlock and remove the malware. The FBI recently reported that [...]

SYNful Knock and a New Age of Phishing

By | September 21st, 2015|Uncategorized|

Earlier this week, Reuters reported that security researchers uncovered a new malware strain called SYNful Knock, targeting Cisco routers. Once installed, SYNful Knock gives cyber criminals the ability to harvest data being shared via the router without being detected. The malware has already been found on a handful of Cisco routers in four different countries. [...]

Don’t Fall for Scareware

By | March 26th, 2015|Uncategorized|

Have you seen one of these lately? If you have, you are not alone. These pop-ups are called scareware and their sole purpose is to try and trick consumers into downloading malicious pieces of software or contacting a malicious entity who will then try to secure personal or financial information. Scareware has been around for [...]

News Recap: WireLurker Malware

By | November 6th, 2014|Uncategorized|

Researchers at Palo Alto Networks announced this week that they have unearthed a new malware strain that targets Apple products. The malware has been dubbed “WireLurker.”Brett Molina, of USA Today, reported, “security researchers have discovered new malware targeting Apple's iOS mobile operating system and OS X for Macs that can be transmitted through USB connections.” [...]

Keylogging malware on public computers is a growing concern

By | July 23rd, 2014|Uncategorized|

This month, the U.S. Secret Service issued a warning about the increasing practice of hackers installing keylogger malware on computers in hotel business centers. The malware captures keys struck by hotel guests that use the computers and then sends that information via email to the malicious hacker. The result – any sensitive information the traveler [...]

News Recap: Senate Report Aims to Stop Malvertisements

By | May 29th, 2014|Uncategorized|

Earlier this month, the United States Senate published Online Advertising And Hidden Hazards to Consumer and Data Privacy, a report that analyzes and investigates the distribution of malware through online ads.AdWeek’s Katy Bachman shared insights from the report, citing that “in some instances, clicking the play button would initiate a pre-roll ad on YouTube or [...]

How Infected Are We? A Closer Look at Malware

By | May 22nd, 2014|Uncategorized|

This infographic and blog post is shared by Roscoe Crowell, freelance writer and security expert at toptenreviews.com.Year after year malware continues to increase in volume and simultaneously becomes more dangerous. Last year alone, approximately 27 million new strains of malware were created and released into the wild. That’s about 74,000 new viruses per day.So what [...]

cyberSAFE Webinar Series is Back: SMB Security Solutions for Every Stage of Growth

By | May 12th, 2014|Uncategorized|

Our Experian cyberSAFE series is back with another great webinar: June 10 at 12 pm CT on SMB security.As a small business owner, your security needs are constantly changing as your business grows. When starting a business, security risks are tied closely to your personal and business credit. As the size and scope of your [...]

Evolution of Identity Management

By | February 6th, 2014|Uncategorized|

Protecting your identity isn’t as cut and dry as it was before the digital age. Before the internet, identity thieves would find personal data by hunting through the garbage for sensitive documents, phishing for private information via phone rather than email or purchasing personal data from unscrupulous store employees.Now, with advances in technology, identity thieves [...]

Load More Posts