The Price of Popularity: WordPress Security Woes

March 9, 2016 | NSFOCUS

CMS Wire WordPress is everywhere. According to the latest estimates, 25 percent of all websites around the globe are run on the content management system, which is also one of the most hacked platforms. WordPress sites can be attacked through many kinds of vulnerabilities. The article pinged a number of security experts on the topic […]

Reactions to the KeRanger ransomware for Macs

March 8, 2016 | NSFOCUS

Help Net Security  Security researchers have discovered the first fully functional aimed at Mac users. The malware, dubbed KeRanger has been found bundled into the Mac version of the open source Transmission BitTorrent client, and made available for download on the Transmission developers’ official website. Vann Abernethy, our CTO pointed out that these types of […]

Ransomware migrates to Apple Mac computers

March 8, 2016 | NSFOCUS

ComputerWeekly Security researchers have uncovered what is believed to be the first active malware to encrypt Apple Mac computers and demand ransom to unlock them. Our chief technology officer Vann Abernethy said, “as Apple computers and devices become more popular with corporate IT departments, there’s recognition by attackers that valuable data and resources are available […]

DDoS – Best option to get the job done!

February 26, 2016 | Adeline Zhang

Track:  Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS In the world of getting from one place to another, people face a common dilemma.  What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best […]

When Malware Becomes a Service, Anyone Can Be a Hacker

February 25, 2016 | NSFOCUS

Gadgets 360 A DDoS attack, one of the most popular available attacks has been offered as a service commercially to anyone interested by hacking group. Our senior technical expert Vann Abernethy said “Distributed Denial of Service attacks have been around for a while now, and each year they grow in size, number, and sophistication. We […]

DDoS attacks: how to mitigate these persistent threats

February 25, 2016 | NSFOCUS

CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]

Downstream networks detect Wendy’s breach

February 25, 2016 | NSFOCUS

The Green Sheet Numerous consumers who used credit cards at Midwest and Northeast locations of The Wendy’s Co. in the latter part of 2015 were notified by their card issuing banks of a potential data security breach. Company spokesman Bob Bertini advised news media that fraudulent charges began to appear elsewhere after the cards were […]

Was Hollywood Presbyterian ransom attack preventable?

February 23, 2016 | NSFOCUS

MedCity News The hackers who brought down the computer network and connected medical devices at Hollywood Presbyterian Medical Center in Los Angeles have taken healthcare cyberattacks to the next level, according to a maker of network security technology. The hackers are demanding a ransom of 9,000 Bitcoin, equivalent to about $3.6 million, to unlock the […]

Phony CloudFlare DDoS page redirects victims to Nuclear EK

February 18, 2016 | NSFOCUS

SC Magazine CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer […]

Building a better defense – tech, people, process

February 17, 2016 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally […]

Search

Subscribe to the NSFOCUS Blog