logoSign upLog in
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Forbes Welcome
    www.forbes.com The bad news is that the MacOS's reputation for mythical-level security is only true if 'mythical' is understood as imaginary rather than legendary. The good news is that it's an easy problem to...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #Ransomware, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Ransomware operators are hiding malware deeper in installer packages
    blogs.technet.microsoft.com We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective move by attackers to once again dodge AV detection by changing the way they package malicious code....
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #Malvertising, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Still Getting Served: A Look at Recent Malvertising Campaigns Involving Exploit Kits « Threat Research Blog
    www.fireeye.com FireEye researchers showcase some of the prominent malvertising campaigns active over the last four months, as well as the cushion servers related to different exploit...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #Phishing, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Latest phishing tactics: infected PDFs, bogus friend requests, fake HR emails
    nakedsecurity.sophos.com The bad guys have always got new tricks up their sleeves: here are some tips to help you steer clear of...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #GRC
    Jaime Contreras, MBA, CISM, CISA
    New York Cyber Security Law Emphasizes Governance, Risk & Compliance – Continuum GRC
    medium.com The first phase of the New York state cyber security regulations, which apply to insurance companies, banks, and other...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    A Google Chrome scam is tricking users into emailing their credit card details to criminals
    www.independent.co.uk Cybercriminals have created a malicious app designed to trick unsuspecting Chrome users into giving away their credit card details.  The malware, which has been dubbed ‘Betaling - Google Chrome’, does a pretty convincing job of imitating Google’s...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Winning the security game with intelligence | Networks Asia
    www.networksasia.net We find out how actionable, relevant and timely threat intelligence can help APAC businesses gain the Clarity, Context and Control that they need to live up to the pace of today’s digital...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Revolutionising the cyber-security skills gap with ‘ethical hacking’
    www.businesslive.co.za With a dire shortage in skilled IT staff, our raw talent needs to be developed to create the next generation of security professionals, writes Riaan van...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #IoT, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Mirai is the hydra of IoT security: too many heads to cut off
    www.cio.com Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    citadel-information.com CitadelOnSecurity CyberSecurityManagement CyberCrime CyberDefense FinancialCyberSecurity IdentityTheft CyberPrivacy NationalCyberSecurity...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Cyber threats banks face in 2017
    www.enterpriseinnovation.net As banks race to introduce digital channels, whether alone or in partnership with Fintech startups, they are becoming magnets to new threat actors. F5 offers some options for...
    Relevant
  12. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #Adware
    Jaime Contreras, MBA, CISM, CISA
    Sneaky adware exploits Android users with precision targeting | ZDNet
    www.zdnet.com Skinner Adware went undiscovered for two months, thanks to subtle tactics which saw it base adverts on which apps 10,000 infected victims were using at that...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #FIM
    Jaime Contreras, MBA, CISM, CISA
    FIM: A Proactive and Reactive Defense against Security Breaches
    www.tripwire.com FIM helps organizations monitor, detect, and manage all changes with the goal of answering the question: "Are systems still in a secure and trusted...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #PUP
    Jaime Contreras, MBA, CISM, CISA
    Remove the Advanced PC-Fixer PUP
    www.bleepingcomputer.com Advanced PC-Fixer is a potentially unwanted program that scans Windows for malware, system performance issues, software issues, and startup issues. When Advanced PC-Fixer scans a computer it will list a variety of detected issues, but in order to...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #Privacy, #DataSec
    Jaime Contreras, MBA, CISM, CISA
    5 things you should never send over email or text if you don't want your identity to be stolen
    www.businessinsider.com Don't become a victim of identity theft. Avoid sending certain things over text and email to stay in the...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #IoT
    Jaime Contreras, MBA, CISM, CISA
    The State of the Union for IoT — or Not?
    www.govtech.com There are currently two radically different views regarding the Internet of Things (IoT) in our world. One is bright. The other is dark. Which one will win out? Can they come together — somehow? Here are two opposing perspectives — followed by a...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Microsoft Excel Files Increasingly Used To Spread Malware
    blog.fortinet.com Over the last few years we have received a number of emails with attached Word files that spread malware.  Now it...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    Why is Windows malware cropping up in Android apps?
    nakedsecurity.sophos.com Infected apps are probably themselves victims of malware, say Sophos Labs...
    Relevant
  19. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Nearly two-thirds of polled organizations hit by ransomware, CyberEdge report
    www.scmagazine.com Sixty-one percent of organizations polled in a survey from CyberEdge Group responded that they'd been hit by a ransomware demand. But, perhaps more troubling, a third of those paid the ransom...
    Relevant
  20. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Managing cybersecurity has become more complex: study | Networks Asia
    www.networksasia.net Of the countries surveyed, about 1 in 3 respondents from Thailand and almost 1 in 2 respondents from Singapore felt that managing cybersecurity had become more...
    Relevant
  21. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    The Importance of Speaking the Same Language in Security | SecurityWeek.Com
    www.securityweek.com Risk, reporting, and metrics are three important topics within information security, and they all mean drastically different things to different...
    Relevant
  22. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #Bitcoin
    Jaime Contreras, MBA, CISM, CISA
    Federal Reserve official warns of digital currency’s risks
    venturebeat.com (Reuters) - A top U.S. Federal Reserve official on Friday raised caution about central banks issuing digital currencies as they are vulnerable to cyber attacks and criminal activities along with privacy issues that still need to be...
    Relevant
  23. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Fake Extortion Demands and Empty Threats on the Rise
    blog.surfwatchlabs.com I’ve previously written about the rise of extortion as an emerging trend for 2017, but if you didn’t want to take my word for it, you should have listened to the numerous warnings...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #CyberSec, #RSA
    Jaime Contreras, MBA, CISM, CISA
    What's Next in Cybersecurity? Ripped From the RSA Conference Floor | SecurityWeek.Com
    www.securityweek.com While there were many amazing startups with great ideas at RSA this year, I fear they will struggle to convince new customers that “yet another dashboard” or source of threat analytics or intelligence is going to improve their cybersecurity...
    Relevant
  25. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    Ransomware Onslaught Continues: Old Foes, New Defenses
    www.bankinfosecurity.com Crypt0L0cker ransomware - originally tied to the Gameover Zeus gang - has returned, researchers warn, and in some cases is digitally signed to make it...
    Relevant
See all