By Jonathan & Erik Bernstein on April 2, 2014
Example of how the cybersecurity issues of others can quickly become your own As cybercrime becomes ever more lucrative, hackers are seeking to attack specific targets in any way possible. In a reminder of the reality that, even if your systems are secure, there are ways for criminals to target your customers from other angles, […]
By Jonathan & Erik Bernstein on February 28, 2014
Government steps in to help contractors running critical infrastructure secure their systems Experts have been warning for some time that hackers from criminal organizations and various nation-states with whom we don’t see eye-to-eye are targeting critical infrastructure, including power, water and nuclear systems, here in the States. Recognizing the lack of understanding and preparedness among […]
By Jonathan & Erik Bernstein on February 21, 2014
Cyber criminals hit University of Maryland Despite a recent doubling in IT security staff, personal data including names, Social Security numbers, dates of birth and university ID numbers belonging to nearly 310,000 individuals was stolen from the University of Maryland’s computer systems. In response, University President Wallace Loh (and, you can bet, his crisis management […]
By Jonathan & Erik Bernstein on February 18, 2014
How hackers used a fridge to conduct a cyber crime campaign It’s clear that an increasing number of the things we use every day can and will be connected to the ‘net. However, the same connectivity that allows us to turn down our thermostat or click off the TV while we’re away from home also […]
By erik on January 16, 2014
Does your crisis management planning include cyber crime? Every year brings new threats to the forefront, and according to experts 2014 is going to see an explosion in the number, and severity of, cyber attacks. If your crisis management plans don’t already include the possibility of data theft, systems being held ransom, or even completely […]
By erik on November 7, 2013
The most vulnerable point of access to your data isn’t a computer, but a human being Cyber security has been a hot topic as of late, but few are discussing the fact that humans are actually the weakest link in the information security chain. While hackers do employ some seriously powerful tools, it’s often just […]
By Jonathan & Erik Bernstein on May 15, 2013
Were you aware of this sneaky way your system can be infected? Rarely a week goes by now that we don’t hear of a new cyber attack as hackers’ approaches become more bold and sophisticated. Early this month, a U.S. Department of Labor page that shares information on toxic substances at facilities around the U.S. […]
By Jonathan & Erik Bernstein on March 27, 2013
Unprecedented attack demonstrates the dangers that lie ahead Around the world, ‘net users are experiencing slowed connections as a result of what may be the largest cyber battle to date. Spam fighting group Spamhaus has been facing an extended and incredibly powerful DDoS attack from Cyberbunker, a Dutch web host recently blacklisted for hosting a […]
By Jonathan & Erik Bernstein on February 2, 2013
Are you prepared for a cyber attack? On Thursday morning the New York Times announced that, over the past four months, Chinese hackers have been perpetrating a campaign of attacks on the paper’s computer systems. Here are more details from the Times article, written by Nicole Perlroth, that broke the story: The timing of the […]