10 Steps to Cyber Security

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat 10 Steps to Cyber Security
Author/Researcher: National Cyber Security Centre
Source: https://www.ncsc.gov.uk
Overview: Defining and communicating your Board’s Information Risk Regime is central to your organisation’s overall cyber security strategy. The National Cyber Security Centre recommends you review this regime – together with the nine associated security areas described below, in order to protect your business against the majority of cyber attacks. Read More

Stealing Windows Credentials Using Google Chrome

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat Stealing Windows Credentials Using Google Chrome
Author/Researcher: Bosko Stankovic (bosko@defensecode.com)
Source: http://www.defensecode.com
Overview: Attacks that leak authentication credentials using the SMB file sharing protocol on Windows OS are an ever-present issue, exploited in various ways but usually limited to local area networks. One of the rare research involving attacks over the internet was recently presented by Jonathan Brossard and Hormazd Billimoria at the Black Hat security conference[1] [2] in 2015. However, there have been no publicly demonstrated SMB authentication related attacks on browsers other than Internet Explorer and Edge in the past decade. This paper describes an attack which can lead to Windows credentials theft, affecting the default configuration of the most popular browser in the world today, Google Chrome, as well as all Windows versions supporting it. Read More

Youth Pathways into Cybercrime

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat Youth Pathways into Cybercrime
Author: Research leads: Professor Mary Aiken, Professor Julia Davidson & Dr Philipp Amann
Source: http://www.mdx.ac.uk/
Overview: Many security and police professionals spend their time analysing the technical and mechanical aspects of cybercrime, dissecting malware and exploit tools, forensically analysing code and techniques. However, few actively focus on the social and psychological aspects: who for example is the attacker, what motivates them, and more importantly how and when did this deviant behaviour begin? Understanding the behavioural and developmental aspects of cybercriminality is becoming increasingly important, and underlies the necessity of a shift in focus from sanctions to deterrence and prevention. That being said, there is an urgent need to understand the pathways that lead some young people into cybercrime hence it is important for parents to be aware of their own youth’s online activity and risk. Read More

Ascending the Ranks : The Brazilian Cybercriminal Underground in 2015

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat Ascending the Ranks : The Brazilian Cybercriminal Underground in 2015
Author: Trend Micro Security Team – Forward-Looking Threat Research (FTR) Team
Source: http://www.trendmicro.com/
Overview: The fastest route to cybercriminal superstardom can be found in Latin America, particularly in Brazil. Any criminal aspirant can gain overnight notoriety with just a little bit of moxie and the right tools and training, which come in abundance in the country’s untamed underground. Read More

2016 Trend Micro Security Predictions: The Fine Line

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat 2016 Trend Micro Security Predictions: The Fine Line
Author: Trend Micro Security Team
Source: http://www.trendmicro.com/
Overview: Every year, the triumphs and failures reflected in cyber security stories not only leave us with valuable lessons but also hints of the foreseeable future. Looking closely, we get to pick pieces of the puzzle that we can use to build a vivid picture of what’s to come. Read More