Spearphishing and Cyberterrorism

March 27, 2015

Writing in TechCrunch, Tom Chapman, director of cyber operations of Edgewave, describes how terrorists can apply the same techniques used against Anthem, Sony and many others to engage in cyberterrorism.

cyber terrorists

What could these technique be? Spearphishing. Learn more at our new blog.

Advertisements

11 Million Health Records Compromised With Deceptive Spelling

March 18, 2015

Premera, a leading health insurance company, has suffered a cyber breach impacting 11 million people. The company’s announcement says it has been the victim of a “sophisticated cyberattack.”

premera

What could this sophisticated attack have been?  Learn more at our new blog.


New White Paper – Spearphishing Countermeasures

March 17, 2015

We have released a new white paper entitled “Spearphishing Defense Using Deception Countermeasures.” This paper discusses how technical defenses (such as email filtering, malware detection, firewalls, limited user privileges, and system monitoring) leave systems unnecessarily exposed to phishing attacks because the human attack surface remains easily accessible and subject to successful attacks based on principles of psychology which are exploited using military deception. We propose deception countermeasures which modify the email interface, thereby making the user less susceptible to email-based deception. Learn more at our new blog.


Spoofing the Boss Cybercrime

March 13, 2015

Brian Krebs, writing in KrebsonSecurity, describes a scam in which criminals use email to impersonate company executives.

cyberthiefThe thieves use fake emails to issue bogus payment instructions to  finance and accounting staff.

Learn more at our new blog.