scam

July 13, 2017

SECURITY

Are You The Lucky One? Sometimes Luck Can Bring You Malware

6 min read

For more than two decades, malicious actors have been evolving their Phishing techniques to effectively achieve their goals. From poorly crafted scams to extremely well crafted documents, Phishing attacks keep being a very effective...

How to Build a Retail Culture of Security

3 min read

Hello! My name is Teresa Devine, and I am a business transformation advisor here at Cisco. I help large enterprises in retail and hospitality define and execute digital transformation strategies. A key area of interest of mine is security: As a former Fortune 500 CIO and acting CISO, I understand the demands and complexities that […]

July 31, 2015

THREAT RESEARCH

Your Files Are Encrypted with a “Windows 10 Upgrade”

4 min read

This post was authored by Nick Biasini with contributions from Craig Williams & Alex Chiu Update 8/1: To see a video of this threat in action click here Adversaries are always trying to take advantage of current events to lure users into executing their malicious payload. These campaigns are usually focussed around social events and are […]

March 3, 2015

SECURITY

The Seven Deadly Sins of User Access Controls: Part I

2 min read

2014 was a terrible year for corporate data breaches. If there is to be any silver lining, information security professionals must draw lessons from the carnage. A good place to start is to identify common denominators. Several of the most damaging incidents started with phishing emails into office (or contractor) networks. Social engineering has gotten […]

August 27, 2014

SECURITY

Social Engineering:
 Finding the Weak Links In-Person

2 min read

An enterprise can pay hundreds of thousands of dollars or more for the latest security software and imagine itself protected from targeted attacks that come in via the network. But if the threat is a real-live person who walks in the front door of an office or server farm, what good can the network edge […]

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

4 min read

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sophistication in order to increase their success rate. Up until now, […]

October 3, 2013

SECURITY

Ten Simple Ways to Enhance Cyber Security for You and Others

5 min read

Hi there and welcome to today's U.S. National Cyber Security Awareness Month tip, courtesy of those of us involved in administering and/or contributing to Cisco Security Intelligence Operations!! For...

August 15, 2013

SECURITY

The Highs and Lows of the Pump and Dump Scam

3 min read

The Internet remains an environment where it is important to keep your wits. The recent indictment of nine individuals on stock fraud charges reminds us that the pump and dump scam continues to be perpetrated [1][2]. Stock spam emails were particularly prevalent during the mid-2000’s, with these messages reportedly comprising 15% of all spam in […]