Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Paul Ryan: Smartphones Are Cleaning FEMA Out

September 7, 2017



According to Speaker of the House, Paul Ryan, people are using smartphones to apply for FEMA assistance at unprecedented levels and as a result it is nearly out of funds.

This wasn't possible in past disasters because people needed PCs, electricity and homes which weren't flooded or destroyed to connect to the internet.

Hurricane Harvey and it's immense amount of flooding has destroyed a large number of homes (above) while Hurricane Irma has already hit land in the US territory of Puerto Rico and will hit the US mainland soon. Even worse, hurricane Jose isn't far behind Irma.

Smartphones have made the pace of everything happen more quickly and asking for assistance from FEMA is no different and while this is great for those in need, it will put inordinate strain on government budgets to ensure the emergency fund stays solvent.







Lack of Cybersecurity Training Just Cost 8 Million Dollars

August 31, 2017

The Cybersecurity problem gets worse by the day and as we have covered before, there is an increase in attacks targeting money-transfer. In fact, while ransomware isn't going away any time soon, the sheer amount of money which can be scored from a wire transfer scam is so enormous that ransomware pales in comparison.

As we just wrote:

  • Money transfer attacks occur when company employees are tricked into wiring money to a hacker account through what looks like a legitimate email from their boss or other authorized authority. By hacking mailboxes, malicious users can learn patterns and terms used by an organization and subsequently use these terms against them. Tens or hundreds of millions of dollars are lost by corporations each year through such attacks.

Some time back we wrote about Portnox and how they add visibility and control to help secure networks.

Intermedia Anti-Phishing Tools for Small Business

August 21, 2017



Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor which gives them access to your passwords or perhaps they could start installing ransomware.

All a company can do is be as protected as possible. One way to achieve this is with strong anti-phishing tools - similar to the ones rolled out by Intermedia last week.

The company says they have unveiled Enterprise-grade anti-phishing protection, designed for SMBs - otherwise knows and small and medium businesses.

The new Intermedia Email Protection features include:

  • Similar domain check: Spear-phishing campaign authors will typically register an email domain that looks 'similar' to a company's email domain (e.g., iintermedia.net with two i's instead of intermedia.net). Intermedia's domain check feature uses a similarity algorithm to confirm that the sending domain is in fact is someone from within the organization.
  • User impersonation check: Spear-phishing attacks target specific employees within an organization, by impersonating someone they know – most typically the CEO or other high-profile individuals.








The Long Tail of Cybersecurity

August 9, 2017

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.

The online world made this possible. Try as they might, Barnes & Noble could not match the inventory of Amazon in all its stores. Online wins because inventory is near-infinite.



In the cybersecurity world there is is a similar phenomenon taking place. The same bell curve applies but in this case, we can assign it to the value of a target.





StaffAlerter Provides Value in Emergency Notification and IoT

July 8, 2017

With terrorist attacks and other shooting incidents becoming commonplace, the need to quickly notify large groups of people regarding dangerous situations seems to have never been greater. While many of the solutions on the market are targeted at governments or large police departments, the emergency notification system on a budget market has been neglected.

Enter StaffAlerter, the infinitely flexible solution which combines the power of IoT-like sensors with IFTTT real-world flexibility. By this we mean that the system can be easily programmed to sense an emergency button being activated in the freezer and then proceed to unlock the freezer door.

Portnox Adds Visibility and Control To Help Secure Networks

June 20, 2017

Networks have become so complex that securing them has become an increasingly complex challenge. As the number of attack vectors increase seemingly endlessly, corporations need to have a commensurate solution which scales with device growth, allowing IT to protect their networks from the various threats they encounter.

Ofer Amitai the CEO of security vendor Portnox believes visibility is the first step in protecting yourself followed by monitoring the devices to control the risk. He continues by saying that networks should be segmented to ensure things like cameras are not on the same network as users – or available from the outside.

Tempered Networks Boosts Trust with Identity-Defined Networks

June 19, 2017

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with and added letter u.

The idea behind the company is to build trust between systems to go beyond encryption by using Host Identity Protocol for encryption and IF-MAP. “This is a way to have inherent security in your network because it doesn’t happen at the application layer, it happens at the protocol,” said Jeff Hussey, who established F5 Networks and is now President and CEO of Tempered Networks.

Some months later the company outlined their vision – or the problem they are out to solve in more detail:

Cybersecurity Fail: Microsoft Responds to WannaCrypt Outbreak

May 13, 2017

Three years ago Microsoft stopped supporting Windows XP but this doesn't mean people stopped using the OS. Sadly, it is embedded in many systems from military to healthcare among many others. One of the challenges for companies running these older systems is exploits which can attack newer operating systems also affect XP - but since Microsoft doesn't patch the OS anymore, these systems become sitting ducks for attackers who learn about the exploits via public system patches.

This past week, a slew of ransomware attacks took place across the globe thanks to leaked information from US intelligence on how to take advantage of security holes in various Microsoft operating systems.

These attacks targeted healthcare and telecom among other industries and could cost lives. Over 57,000 computers have been targeted and the attacks have hit over 99 countries!

Microsoft responded by patching Windows XP - an unprecedented step which acknowledges that the hackers are winning the war against our technology. 





What The U.S. Tax Code can Learn From Ransomware

May 6, 2017

U.S. citizens in Little Rock Arkansas pay the same federal income tax as those in New York and Beverly Hills - even though the latter two states also have high state income tax and NYC even has a city income tax! According to Business Insider, here are the vital stats on this city with the lowest cost of living - Little Rock:

Median rent: $785

Median home value: $151,600



Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

April 11, 2017

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.

In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam organization Spamhaus, Levashov is listed as one of the World’s 10 Worst Spammers and “one of the longest operating criminal spam-lords on the internet”.

How did he get caught? Levashov was arrested in Barcelona, Spain under a U.S.



Featured Events