Protect Yourself from the Anthem Data Hack

Posted by Josh Brotheim

Feb 26, 2015

img_2015-02-27_Anthem-Facts

IDENTITY

This article isn’t for everyone - only eighty million of you (or 78.8 million to be more precise). That’s the whoppingly huge number of Anthem Health Insurance customers whose personally identifiable information (PII) is now in the hands of internet thieves. If you’re a current or former Anthem subscriber (or a Blue Cross Blue Shield subscriber who received services from Anthem), crooks probably have your full name, birth date, member ID data, street address, phone number, email address, and employment information.

Topics: Identity

Authentic8 Silo Enhanced to Integrate Seamlessly With Local Browser

Posted by Ramesh Rajagopal

Feb 25, 2015

img_2015-02-25_Web-Portal

CORPORATE NEWS

MOUNTAIN VIEW, CA--(Marketwired - Feb 25, 2015) - Authentic8, maker of Silo the cloud-based secure browser for businesses, introduces integration with the local browser via a single sign-on portal to improve administrators' control over web-based applications and streamline access for end users.

Topics: Corporate News

Lenovo and Superfish put your security and privacy at risk

Posted by Scott Petry

Feb 19, 2015

img_2015-02-19_Engadget-Superfish

NEWS

If you own a new Lenovo computer, your Web surfing sessions might not be private and your personal information is at risk. This unsettling problem comes courtesy of a partnership between Lenovo, the world’s largest seller of PCs, and their corporate partner, Superfish (which also may be linked to another SSL snooping company, Komodia).

Topics: News

Monthly News Roundup - January 2015 (TL;DR)

Posted by Drew Paik

Jan 31, 2015

img_2015-01-06_SC-Computing

NEWS

Did you keep your New Year’s resolution to strengthen your firm’s network security? In case you needed more incentive to make that happen, here are the most alarming InfoSec news highlights from the first month of 2015:

Topics: News

Wait, don’t pay that invoice! You might be keeping a crook in business.

Posted by Scott Petry

Jan 27, 2015

img_2015-01-26_Network-World

NEWS

The FBI has issued a warning about a scam that tricks employees into paying invoices that appear legit, but are actually fraudulent. This scam, named the Business E-mail Compromise Scam (BEC), has caught the U.S. Government’s eye because of its increasing popularity.

In the past 14 months, reported victims of BEC rip-offs have lost over $200 million. And remember that as my co-founder wrote in Forbes last year, when a business is the victim of wire fraud, you can't always count on the banks making good again.

Topics: News

Cracks in the foundation: A look back on 2014

Posted by Scott Petry

Jan 14, 2015

img_2015-01-14_FoundationNEWS

Last year ended with a bang -- a devastating attack against Sony and a lot of finger pointing in the press. The fallout from the exploit will not only impact Sony’s IT posture, but as class action lawsuits pile up, Sony Entertainment will be dealing with the cleanup for a long time. These individual, high-visibility exploits create an awareness spike. But our attention doesn’t last. As soon as the press stops talking about it, people return to life as normal and take their computing for granted. As security professionals, we can’t afford to be distracted by the headlines.

Topics: News

A few words about privacy

Posted by Ramesh Rajagopal

Dec 30, 2014

img_2014-12-27_Twitter-Mitnick

CORPORATE NEWS

Over the weekend, Kevin Mitnick tweeted a comment after reading our privacy policy. I responded with a couple of tweets but thought a more comprehensive response was warranted, because he raises a good point.

Topics: Corporate News

Monthly News Roundup - November 2014 (TL;DR)

Posted by Drew Paik

Nov 30, 2014

img_2014-11-12_Ars-Technica

NEWS

Happy Thanksgiving! This month has been typically busy in the world of cyber-security. As we head towards the end of the year, and the holiday shopping season, experts are warning retailers to increase their vigilance. In a year that has seen widespread hacking of companies including Home Depot and Target, it stands to reason that we’ll see an uptick in attacks as shoppers get ready for the holidays. Here are some of the stories that piqued our interest in November:

Topics: News

Open source malware means more (and more dangerous) attacks

Posted by Scott Petry

Nov 24, 2014

img_2014-11-24_PhishLabs

NEWS

We’ve talked quite a bit about the increasing number of attacks being reported over the past few months. This is partially due to the increasing use of web apps and reliance on the browser as a way of accessing business information. But it’s also attributable to the increase in “open source” malware. As with key layers of the Internet stack, the source code of various exploits have been released by the authors, and other developers are building on that base.

Topics: News

Protect yourself from what you research!

Posted by Josh Brotheim

Nov 18, 2014

img_Isolation-Chamber-Kitten

CORPORATE NEWS

Re-imaged machines, local sandboxes, and even process emulation on the user’s device are common tactics researchers use to insulate themselves from the malicious content they need to capture and analyze. But if you step back and think of it, these approaches violate a core tenet of security research: they expose their local resources (e.g. IP address, network gateway, local servers, local machine) to the threat.

Topics: Corporate News

The official blog of Authentic8

Blog Home
Sign up for Silo
Contact Us

Subscribe to Email Updates