Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Intermedia Anti-Phishing Tools for Small Business

August 21, 2017



Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor which gives them access to your passwords or perhaps they could start installing ransomware.

All a company can do is be as protected as possible. One way to achieve this is with strong anti-phishing tools - similar to the ones rolled out by Intermedia last week.

The company says they have unveiled Enterprise-grade anti-phishing protection, designed for SMBs - otherwise knows and small and medium businesses.

The new Intermedia Email Protection features include:

  • Similar domain check: Spear-phishing campaign authors will typically register an email domain that looks 'similar' to a company's email domain (e.g., iintermedia.net with two i's instead of intermedia.net). Intermedia's domain check feature uses a similarity algorithm to confirm that the sending domain is in fact is someone from within the organization.
  • User impersonation check: Spear-phishing attacks target specific employees within an organization, by impersonating someone they know – most typically the CEO or other high-profile individuals.








The Long Tail of Cybersecurity

August 9, 2017

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.

The online world made this possible. Try as they might, Barnes & Noble could not match the inventory of Amazon in all its stores. Online wins because inventory is near-infinite.



In the cybersecurity world there is is a similar phenomenon taking place. The same bell curve applies but in this case, we can assign it to the value of a target.





StaffAlerter Provides Value in Emergency Notification and IoT

July 8, 2017

With terrorist attacks and other shooting incidents becoming commonplace, the need to quickly notify large groups of people regarding dangerous situations seems to have never been greater. While many of the solutions on the market are targeted at governments or large police departments, the emergency notification system on a budget market has been neglected.

Enter StaffAlerter, the infinitely flexible solution which combines the power of IoT-like sensors with IFTTT real-world flexibility. By this we mean that the system can be easily programmed to sense an emergency button being activated in the freezer and then proceed to unlock the freezer door.

Portnox Adds Visibility and Control To Help Secure Networks

June 20, 2017

Networks have become so complex that securing them has become an increasingly complex challenge. As the number of attack vectors increase seemingly endlessly, corporations need to have a commensurate solution which scales with device growth, allowing IT to protect their networks from the various threats they encounter.

Ofer Amitai the CEO of security vendor Portnox believes visibility is the first step in protecting yourself followed by monitoring the devices to control the risk. He continues by saying that networks should be segmented to ensure things like cameras are not on the same network as users – or available from the outside.

Tempered Networks Boosts Trust with Identity-Defined Networks

June 19, 2017

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with and added letter u.

The idea behind the company is to build trust between systems to go beyond encryption by using Host Identity Protocol for encryption and IF-MAP. “This is a way to have inherent security in your network because it doesn’t happen at the application layer, it happens at the protocol,” said Jeff Hussey, who established F5 Networks and is now President and CEO of Tempered Networks.

Some months later the company outlined their vision – or the problem they are out to solve in more detail:

Cybersecurity Fail: Microsoft Responds to WannaCrypt Outbreak

May 13, 2017

Three years ago Microsoft stopped supporting Windows XP but this doesn't mean people stopped using the OS. Sadly, it is embedded in many systems from military to healthcare among many others. One of the challenges for companies running these older systems is exploits which can attack newer operating systems also affect XP - but since Microsoft doesn't patch the OS anymore, these systems become sitting ducks for attackers who learn about the exploits via public system patches.

This past week, a slew of ransomware attacks took place across the globe thanks to leaked information from US intelligence on how to take advantage of security holes in various Microsoft operating systems.

These attacks targeted healthcare and telecom among other industries and could cost lives. Over 57,000 computers have been targeted and the attacks have hit over 99 countries!

Microsoft responded by patching Windows XP - an unprecedented step which acknowledges that the hackers are winning the war against our technology. 





What The U.S. Tax Code can Learn From Ransomware

May 6, 2017

U.S. citizens in Little Rock Arkansas pay the same federal income tax as those in New York and Beverly Hills - even though the latter two states also have high state income tax and NYC even has a city income tax! According to Business Insider, here are the vital stats on this city with the lowest cost of living - Little Rock:

Median rent: $785

Median home value: $151,600



Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

April 11, 2017

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.

In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam organization Spamhaus, Levashov is listed as one of the World’s 10 Worst Spammers and “one of the longest operating criminal spam-lords on the internet”.

How did he get caught? Levashov was arrested in Barcelona, Spain under a U.S.



Malicious Email of the Day

April 8, 2017



This is the best malicious e-mail I have seen in a while. It disguises itself with a From line: Microsoft OneDrive <noreply@icloud.com>. It looks legit until you realize iCloud competes with Microsoft and its Onedrive. Looking at it quickly - you could think it is an official reminder of a real document you need to look at.

It also tells me I have something waiting - it sounds like it could be a gift.



ITEXPO Attendee Cap'n Crunch Needs Your Help

April 4, 2017



I first met John Draper or Cap'n Crunch at ITEXPO in Los Angeles as he was looking to connect with Asterisk Creator and Digium founder Mark Spencer. I still remember how mystified people at the conference were when they learned this gentleman's nickname was a breakfast cereal. In case you don't know the story, John blew the whistle that came in the box of Captain Crunch cereal into a phone and was able to subsequently hack into the AT&T Central Office.



He became the first hacker by accident.

Draper also knew Steve Jobs and Steve Wozniak, a past ITEXPO keynoter.

The Cap'n now needs our help. He has a major medical situation.









1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 67 Next
Featured Events