The Real Lesson from the AWS Outage

The Real Lesson from the AWS Outage
by Matthew Rosenquist on 03-08-2017 at 7:00 am

The embarrassing outage of Amazon Web Services this week should open our eyes to a growing problem. Complex systems are difficult to manage, but if they are connected in dependent ways, a fragile result emerges. Such structures are subject to unexpected malfunctions which can sprawl quickly. One of the most knowledgeable technologyRead More


Adaptation or Crisis – Will Security Save Technology

Adaptation or Crisis – Will Security Save Technology
by Matthew Rosenquist on 02-18-2017 at 12:00 pm

The technology landscape is rapidly changing how we interact and live in our world. The variety of Internet of Things is huge and growing at a phenomenal pace. Every kind of device imaginable is becoming ‘smart’ and connected. Entertainment gadgets, industrial sensors, medical devices, household appliances, and personal assistantsRead More


Missteps in Securing Autonomous Vehicles

Missteps in Securing Autonomous Vehicles
by Matthew Rosenquist on 01-19-2017 at 12:00 pm

Recently an autonomous car company highlighted some plans to keep their vehicles safe from hacking. Yet their plans won’t actually make them secure. Such gaffs highlight issues across many different industries where cybersecurity is not sufficiently understood by manufacturers to deliver products hardened against attack.… Read More


Cyber Risks Compound with Technology Adoption

Cyber Risks Compound with Technology Adoption
by Matthew Rosenquist on 01-12-2017 at 7:00 am

AAEAAQAAAAAAAAj AAAAJDQwNjJmNmEzLTc4NmQtNDM2My1hZTJiLTVkYTg3YjU3ODVkMg

Just how reliant are we on computing infrastructure? Sometimes it takes just a little outage to get a taste of the interwoven dependency we don’t readily see.

It can be small. The international travelers landing in U.S. airports on January 3rd, one of the busiest travel days of the year, found themselves stuck in long lines due to … Read More


Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day

Biggest Cybercriminal Ad-Fraud Rakes in Millions per Day
by Matthew Rosenquist on 12-30-2016 at 12:00 pm

AAEAAQAAAAAAAAc0AAAAJDkxMjIwYmFhLWE2Y2EtNGViZi1hM2M4LTljYTMxYmFjMmI3OA

Methbot is a state-of-the-art ad fraud infrastructure, capable of hosting legitimate videos and serving them to 300 million fake viewers a day. Each view earns the criminals about $13, translating to around four million dollars a day. Over the past few months, Methbot has pulled in an estimated $180 million. It represents one … Read More


3 Tips for Securing Home Cameras

3 Tips for Securing Home Cameras
by Matthew Rosenquist on 12-28-2016 at 7:00 am

Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network security. The goal is to increase the security and peace of mind, while avoiding cybersecurity threats. Here are three tips to consider when purchasing, installing, and configuring your new home camera … Read More


What Does Ransomware Sound Like?

What Does Ransomware Sound Like?
by Matthew Rosenquist on 12-25-2016 at 7:00 am

Congratulations to the multinational government agencies involved in the takedown of the Avalanche cybercriminal infrastructure! The U.S. Attorney’s Office, FBI, Europol, German Police, and others from over 40 countries were involved in disrupting one of the largest support structures for malware, digital money laundering,… Read More


Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot is Becoming an International Sensation with Cybercriminals
by Matthew Rosenquist on 12-22-2016 at 7:00 am

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently being used by a number of different cybercrime groups around the world and is being sold on the dark market for… Read More


Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)
by Matthew Rosenquist on 12-15-2016 at 12:00 pm

AAEAAQAAAAAAAAhUAAAAJGVmZTI3MmI1LTNmMWEtNGFlMi05M2YxLTQ2MzdiMWU0NTE1NQ

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet-of-Things (IoT) devices. The longer-term outlook expands their reach to more… Read More


Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
by Matthew Rosenquist on 12-14-2016 at 12:00 pm

AAEAAQAAAAAAAAiAAAAAJDkzODVhYTI0LWMwNjctNGVhNC1iYzg5LWNlN2QyNTc2ZTRiNg

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to … Read More