-
Unmasking the Imposters, Part 2: Detection and Damage Control
In the first of this two-part security report, we discussed the threat presented to individuals and enterprises by malicious outsiders posing as members of an organisation itself, or representatives of a trusted external institution like a bank or popular online resource. We looked at how these imposters are refining their methods of extracting funds or […]
-
Unmasking the Imposters, Part 1: An Evolving Threat
We’ve come a long way, since the first large-scale outbreaks of advanced fee fraud and email account hacking, back in 1986. In the years to date, cyber-criminals and fraudsters have stepped up their game, considerably – to the point where (in some unfortunate organisations) it’s nearly impossible to distinguish between genuine staff and authorised […]
-
Power Admin Network Technology Scholarship
Power Admin is delighted to announce the Power Admin Network Technology Scholarship. The program will award $2000 to a diligent student each year. The scholarship is intended to help young students afford the increasing cost of tuition and help them along the road to a future career in the networking technology/IT field. Before you […]
-
Early Detection and Prevention of CryptoLocker
In case you haven’t heard, CryptoLocker is a popular form of the ransomware malware that encrypts your files and then holds them hostage. Generally you have to pay to get them decrypted. If you have a backup of all of your data, you might be able to avoid the payment. If you have a backup… […]
-
Early Detection and Prevention of CryptoLocker – The Response Scripts
In the previous post, I mentioned a couple of ways customers are working on detecting CryptoLocker attacks. In this post, I’ll share a few scripts they use in response. Ideally, you could quarantine the user’s computer from where the attack is coming from. In practice, that can be tricky. Note that these responses could be […]
-
Maintaining a Secure SDN
As technologies continue to evolve, the nature of IT infrastructure is changing. Virtualisation, hyper-convergence and increased connectivity are presenting fresh opportunities for malicious intruders to gain access to networks. One of the platforms presenting new possibilities to both network administrators and hackers is SDN. What is SDN? A software-defined network or SDN is an […]
-
Enterprise Applications of Artificial Intelligence
Much of our conception of Artificial Intelligence or AI has been shaped by popular movies: from the homicidal Red Queen of “Resident Evil”, to the J.A.R.V.I.S. operating system / virtual butler that provides logistical support to “Iron Man”. Extremely advanced intelligence and – in some cases – living machine consciousness. We’re not quite […]
-
Making Security an Integral Part of DevOps
In the rush to innovate, steal a jump on the competition, and bring new software products to market, enterprises have embraced the concept of DevOps: the peaceful co-habitation of Development and Operations, for more effective co-operation between the two. But this competitive frenzy often overlooks a vital aspect: security. In this article, we’ll […]
-
Cryptolocker File Extension List
There is a thread on Reddit that lists many known Cryptolocker file extensions (both the extension that the newly-encrypted file gets, and the ransom note file). A number of customers have asked to be able to more easily paste this list of file names into the list of file types to watch, which is […]
-
Making PCI Compliance Less Stressful
If your business requires you to deal with credit card holders, you’ll have records of your customers’ account details. Both your customers and you will want to know that this information is kept safe, and free from prying eyes. It’s not just good business practice; it’s the law. And complying with this legal […]
Got any book recommendations?