Hacking the Gibson
With our recent pleasant surprise at the realistic nature of hacking in the movie Blackhat, we decided to find a few other realistic depictions of hacking in fictional media. While everyone has seen...
View ArticleLinux “Ghost” Vulnerability (CVE-2015-0235)
Researchers at Qualys recently warned organizations about a remote code execution vulnerability in the Linux GNU C Library (glibc). Named GHOST, this is a buffer overflow vulnerability that affects the...
View ArticlePhishing for Awareness
Phishing is a social engineering tactic used by unauthorized users to gain access to sensitive data. Within the last few years, social engineering attacks have been growing in popularity and while end...
View ArticleInformation Security Economics
In a free market, supply and demand should ideally self-regulate, maximizing value. The market (often in the form of consumers) responds to negative corporate events such as faulty products or warranty...
View ArticleShould You FREAK Out?
Recently, a team of cryptographers at INRIA, Microsoft, and IMDEA discovered an SSL vulnerability in OpenSSL and Apple’s SecureTransfer that allow attackers to downgrade the encryption being used from...
View ArticleWhat Did We Learn from the 2015 DBIR
Verizon Enterprise’s 2015 Data Breach Investigations Report (DBIR) was recently released, and SecureState is here to give you some of the big takeaways from this massive report. Verizon works with...
View ArticleCyber Threat Intelligence: Is Sharing the New Defense?
What’s the saying, “If you can’t beat ‘em, join ‘em.”? Sure. Something like that. Doesn’t really work in the world of cybersecurity, though. Staying ahead of the curve does. I guess you can say Target...
View ArticleFired Up
A recent article on Slate ended with the statement, “There’s still no answer to the question of how to get Americans fired up about cybersecurity.” SecureState’s cybersecurity experts decided to get...
View ArticleWhat Did We Learn from the 2015 DBIR, Part 2
The second half of the 2015 Verizon Data Breach Incident Report is dedicated to the nine basic incident patterns that were originally identified in the 2013 DBIR. Over 96% of the data breaches examined...
View ArticleRunning Your Own Phishing Campaign
At SecureState, we often stress to our clients that Social Engineering is one of the most common methods for attackers to gain access. Social Engineering attacks can take many forms, from people...
View Article
More Pages to Explore .....