Good hygiene keeps you safe and healthy, as well as others around you. It’s the same with cyber-hygiene – the sets of practices that organizations are increasingly adopting in a structured way to complement their technological layers of cyberdefense. We highlight cyber-hygiene in many of our publications – alongside...
In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “ is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are...
In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “ is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are...
In 2008, Eva Chen, Trend Micro’s CEO declared: “In the antivirus business, we have been lying to customers for 20 years”. Seven years later, Bryan Dye, Symantec SVP Information Security, stated, “ is dead”. Despite these declarations, antivirus remains a billion-dollar industry with millions of users, whether they are...
Cyber threats have reached epidemic proportions. In the UK for example, nearly half (43%) of all businesses polled by the government in 2018 said they’d suffered a security breach or attack in the previous 12 months — and the real figure could be much higher. One vendor said it...
Cyber-criminals are very well organised and typically operate as part of highly sophisticated and specialised criminal organizations. Needless to say, in terms of the skills and methods used they are often years ahead of the businesses and establishments they target. In response, companies are increasingly hiring cyber security specialists,...
This week marks an important milestone for us here at Blueliv with the announcement of our Threat Exchange Network (beta version). A new release of our strong collaborative community is out to continue fight cyber crime together. Blueliv Threat Exchange Network is designed to share IoCs such as IPs, URLs...
The fight against cybercrime should take on a new direction. It should utilize the collaborative models of social media also referred to as Web 2.0 technologies that allow for the socialization of the fight against cyber threats through a community or group. This is how we can overcome the...
As most of you already know, honeypots are hosts that act as a bait, exposing services on the internet in order to lure attackers. Below is a honeypots introduction. Using honeypots, security researchers can: Monitor the attackers’ activity on the internet. Discover possible vulnerable services being exploited by an...
Botnets and other malicious software attacks that compromise corporate PCs are increasing at an alarming rate and growing in sophistication. In the first half of the year, Blueliv detected and analyzed more than 10 million stolen credentials and credit cards and is now tracking more than 220,000 live crime...
In the recent days we have been seeing a lot of commotion around the botnet Dridex. This improved version of Dridex is proliferating thanks to an effective phishing campaign. Taking advantage of the proximity of the annual tax declaration, the organization behind this botnet is sending emails to unsuspecting...