5 Tips and Tricks to Taming Your Inbox

Remember that time when your Inbox was completely empty? Right, me neither. Organizing your Inbox may seem like an impossible task. If it’s anything like mine, it’s flooded with an endless list of messages, reminders, and advertisements. Here are a few...
Third-Party Application Security

Third-Party Application Security

2014 was a big year for security breaches. Sony, Target, Home Depot, and even Goodwill were severely compromised, leaking an unknown amount of customer information and critical corporate data, some of which being exploited using weak passwords, unpatched Windows...

Secure your web traffic; Why HTTPS is important

There are many ways to transmit information over the Internet from one place to another and all different systems use all different mechanisms and protocols to transmit data from point A to point B. Some are secure and some are less secure (or usually not at all). In...
Ransomware and Your Business

Ransomware and Your Business

Believed to first have been identified in 2013, there’s a new kind of malicious threat floating around the web that continues to pose a risk to business data: ransomware. Ransomware is a type of malicious application that uses common attack vectors (phishing...

Mac Malware in Detail

In the wake of the recent “Flashback” Trojan, I’m sure many of you are wondering why your mac was able to contract this in the first place.  It’s not your fault; Apple is notorious for misleading consumers with their rhetoric.  Macs are just as...

Always Check Android Permissions

Just in from Packet Storm, Symantec has released information regarding the largest Android malware distribution yet. Named Android.Counterclank, it has been found in around 13 apps throughout the Market (most of which are pretty seedy) and still remains in 5. Whenever...

Lessons From Shmoocon 2012

We’re back from another great Shmoocon weekend in DC with some very interesting lessons learned. For those of you who haven’t heard us talk about it before, Shmoocon is a yearly information security convention helded in Washington, D.C.  Hermetic has been...