Mar 25

Cyveillance Weekly Cyber Security Trends Report – March 25, 2014

General Cyber Intel

weekly-cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Mar 17

Cyveillance Weekly Cyber Security Trends Report – March 17, 2015

General Cyber Intel

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Mar 13

Security Threat Assessment: Egypt Economic Development Conference and Sinai Peninsula [White Paper Excerpt]

General Cyber Intel

Egypt Economic Development Conference 2015

The Egypt Economic Development Conference 2015 (EEDC), which kicked off today in Sharm El-Sheikh, is an attractive and high-value target for terrorist groups operating in the Sinai Peninsula. A successful attack could spark media coverage, fulfill ideological objectives to hurt the Egyptian economy, and provoke a repressive response from the Egyptian government that might increase extremist recruitment and fuel the ongoing insurgency.

Read more

Mar 10

Cyveillance Weekly Cyber Security Trends Report – March 10, 2015

General Cyber Intel

weekly-cyber-security-trends-report

Welcome to the Cyveillance Weekly Cyber Security Trends Report

Since threat intelligence is constantly evolving, we publish this weekly cyber security trends report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Feb 27

Why the Anthem Breach May Be a Catastrophic Event for US Children

General Cyber Intel
Today’s blog post comes to us courtesy of guest contributor Tim Rohrbaugh, VP of Information Security for Intersections

Anthem breach

In all the noise around the stolen customer data at Anthem Healthcare, many have missed what is now a new and very serious risk to American households: millions of children’s social security numbers have been stolen, and will be used in waves of financial crimes over decades to come.

Read more

Feb 24

Are Medical Mobile Apps Medical Devices? According to the FDA: Yes.

General Cyber Intel

 

187209893

Modern healthcare has changed dramatically over the past year. In particular, mobile health applications saw an increased adoption rate among smartphone users. Millions of people are now using one or more apps as part of their daily health routine – whether it is tracking workouts or reading notes from a doctor’s office visit. Some apps are less task-oriented and more “Internet of Things”-oriented, helping patients do things like breathe.

Read more

Feb 11

The New Windows 10 Release is Attracting the Attention of Criminals—and Not Why You Might Expect

General Cyber Intel

Among many interesting tidbits in Microsoft’s recent Windows 10 announcement was that it would include two Internet browsers: the classic Internet Explorer, and a new one called Spartan.

Although it’s not that big of news per se, criminals are taking advantage of the media attention that has accompanied the Spartan announcement – not to exploit potential security flaws, although we’re sure that will come soon – but to register domain names associated with it.

Using our proprietary Domain Database tool in our Cyber Threat Center, we found several domain names already registered by non-Microsoft parties, including:

Spartan domains

Although there is no criminal activity associated with these registrations yet, spammers and cybercriminals often register variations of names like this to launch phishing or other online attacks, taking advantage of people who may be curious about new releases.

Did you know? Ongoing domain name registration monitoring can alert you to suspicious or malicious activity that may be associated with your brand.

To find out more about how we can help protect your intellectual property, contact us.