deloitte hacked

Deloitte Accounting Firm Hacked, Client Information Stolen

The Deloitte accounting firm stands as one of the largest private companies in the US, which reported $38.8 billion in revenue last fiscal year which offers tax, auditing, operations consulting, cybersecurity advisory, and merger and acquisition assistance services to large banks, government agencies, and large Fortune 500 multinationals, among others, has been hacked. ...

phishing emails

The Anatomy of Phishing Emails

Think Before You Click

The Engineering

Before we get into the anatomy of phishing emails, we need to define what social engineering is. For the sake of simplicity, it’s a scam that is created by con artists using the same tricks from decades ago when scams were done on the street and over the phone to now, where it’s conducted over the phone, but predominately through email. ...

when hacked

You’ve Been Hacked – What Should You Do?

Signs You’ve Been Hacked

In today’s threat landscape it is a matter of when hackers will gain access to your computer or cell phone, not if. Proper layers of security keep most of the malware out of your system and when malware does make it on your system the impact is reduced by containment, but none of us live in an ideal world. The indicators that a hacker has gained access are not always apparent and may seem like an annoyance or trivial, but if your computer closely matches the following signs, you might have been hacked. ...

pulse wave

Pulse Wave is a New Technique Using an Old Attack

DDoS

Before we get into the nitty-gritty of how the pulse wave attack behaves, we must first define what a distributed-denial-of-service (DDoS) and denial-of-service (DoS) is, so we are all on the same page. Instead of regurgitating text from resources on the internet I have included a nice quote from Wired.

Simple DoS attacks, performed from a single machine, are uncommon these days. Instead, they’ve been supplanted by DDoS attacks, distributed denial-of-service attacks that come from many computers distributed across the internet, sometimes hundreds or thousands of systems at once. The attacking machines are generally not initiating the assault on their own but are compromised machines that are part of a botnet controlled by hackers who use the machines as an army to target a website or system.

...

best practices wireless networks

Security Best Practices for Wireless Networks

The key to securing data is to have positive control of it so only the people that need to access it can and when they need to. Wireless networks pose a challenge to this goal because unlike wired connections wireless networks are reachable for up to 100 feet outside of the home or business. If someone is within the range of the signal, then they have the opportunity to gain unauthorized access to your information. The following is a list of best practices for securing your wireless network. ...