Feb 25

Cyveillance Weekly Trends Report – February 25, 2015

General Cyber Intel


Welcome to the Cyveillance Weekly Trends Report

Since threat intelligence is constantly evolving, we publish this weekly report to keep our customers updated on the latest threats across a variety of industries. You can read an abridged version below. Follow us on Twitter and subscribe to our blog to make sure you don’t miss any of the latest security articles from Cyveillance experts.

Read more

Feb 24

Are Medical Mobile Apps Medical Devices? According to the FDA: Yes.

General Cyber Intel



Modern healthcare has changed dramatically over the past year. In particular, mobile health applications saw an increased adoption rate among smartphone users. Millions of people are now using one or more apps as part of their daily health routine – whether it is tracking workouts or reading notes from a doctor’s office visit. Some apps are less task-oriented and more “Internet of Things”-oriented, helping patients do things like breathe.

Read more

Feb 11

The New Windows 10 Release is Attracting the Attention of Criminals—and Not Why You Might Expect

General Cyber Intel

Among many interesting tidbits in Microsoft’s recent Windows 10 announcement was that it would include two Internet browsers: the classic Internet Explorer, and a new one called Spartan.

Although it’s not that big of news per se, criminals are taking advantage of the media attention that has accompanied the Spartan announcement – not to exploit potential security flaws, although we’re sure that will come soon – but to register domain names associated with it.

Using our proprietary Domain Database tool in our Cyber Threat Center, we found several domain names already registered by non-Microsoft parties, including:

Spartan domains

Although there is no criminal activity associated with these registrations yet, spammers and cybercriminals often register variations of names like this to launch phishing or other online attacks, taking advantage of people who may be curious about new releases.

Did you know? Ongoing domain name registration monitoring can alert you to suspicious or malicious activity that may be associated with your brand.

To find out more about how we can help protect your intellectual property, contact us.

Feb 6

How Can Threat Intelligence Play a Role in PCI 3.0 Compliance?

General Cyber Intel




Many of the organizations we work with must comply with the Payment Card Industry Data Security Standards (PCI DSS) in some way, shape, or form to help safeguard cardholder information. Since the PCI Security Standards Council recently released a new version, PCI 3.0, which took effect January 1, we thought it was a good time to examine how threat intelligence can factor into your PCI compliance program.

For starters, let’s quickly define what we mean by threat intelligence, since this term is bandied about for a wide range of things that may or may not be “intelligence.” Our definition, which we’ve discussed at length in some of our recent whitepapers and webinars, is that whether data is transformed, distilled, or otherwise turned into usable intelligence by software or human intellect, the output must be relevant, actionable, and valuable to your organization.

Read more

Jan 26

Welcome to 2015: Encryption is Not an Option! An Interview with Ivan Ristic

General Cyber Intel

If last year felt like a wild ride in terms of security, you were not alone. Good news though: by encrypting traffic from your organization’s websites, you’ll go a long way in making your users safer with little cost.

We invited security researcher, engineer, and author Ivan Ristic to answer some questions about the business imperative of encryption by default. Ivan is the Director of Application Security Research at Qualys.

Ivan is a not just an expert in online security but a leader in making the web a safer place, as you’ll find in this conversation between Ivan and Cyveillance Chief Scientist Caleb Queern.


Read more