Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

hacker tag

Drill down on hacker search:

25 result(s) displayed for hacker (1 - 25 of 54):

Ransomware is a Plague - Here are Some Cures

Ransomware costs corporations and individuals billions of dollars per year yet many companies seem to care about the threat after they have been hit. Investing resources in this fashion is similar to waiting to be robbed before installing an alarm...

Triton Industrial Cyber Attacks are Coming and We're Not Ready

In 2017, a Middle Eastern petrochemical facility had the unfortunate distinction of being the first known victim of malware specifically targeted at process safety systems. Thanks to this malicious software named TRITON, the oil and gas industry became ground zero...

Top 10 Cybersecurity Risks of the Government Shutdown

The government shutdown is dramatically impacting the world’s cybersecurity. No doubt there are major corporate and government breaches taking place now which could have been prevented if things were operating normally. Here are the top problems the shutdown is causing...

D.C., Virginia, Most Concerned About Phishing Attacks

Phishing is a global scourge. Just today, Danny Palmer at ZDNET writes an excellent piece about how cybercrime is a $600 billion global drain on the economy. Here is an excerpt: "You could argue that 80 percent of cyber...

PHISH360 Helps Solve The $12.5B Phishing Problem

The FBI says email attacks cost business $12.5 billion!This is in-part because hacking into a person's account could be as easy as sending a general phishing or specific spear phishing message.One wrong click by an employee and your company can...

Dispersive Networks Hopes to Be the Future of Secure Networking

The December 2015 Ukraine power grid cyberattack was the first successful attack on a power grid and this event gave rise to Dispersive Networks. According to Wikipedia, the attack was complex consisting of the following steps: Prior compromise of corporate networks...

Array Networks: Laser Focus on Private Cloud Security and Networking

Recently we shared how MSPs and resellers in telecom are going in three directions: The first is business as usual. They continue to sell boxes and/or cloud services. Sometimes they'll just refer the business to the UCaaS provider and other times,...

Kollective Improves Network Performance via P2P Technology

Enterprise network congestion on continues to be a problem as software updates and files continue to grow in size. Add to these challenges, the fact that increasingly, enterprises expect to be able to communicate via video seamlessly.In fact, more than 2,000 US and...

Could Scheduling Logins Make us Safer?

Hackers are relentless. Today it was discovered the Consumer Financial Protection Bureau (CFPB) suffered at least 240 data breaches and another 800 suspected hacks, according to Mick Mulvaney, the acting director of the bureau in congressional testimony.The City of Atlanta has...

Chelsea Manning: Top U.S. Traitor and Leaker, May Become Senator

History Will Remember the U.S. Government as Going too Easy on Hackers and Leakers Photo courtesy of APThe United States made a nuclear deal with Iran and also paid a ransom to have numerous American hostages/prisoners returned. In exchange, billions...

Hackers Now Threaten Death to Schools and other Types of Extortion

Hackers are now breaking into schools which typically have lax security relative to corporations and once in, they access student information and use it to threaten death to students. Mentioning Sandy Hook - a horrific school shooting in Connecticut, a...

The Scary Apple Pay Takeover iconectiv Helps Stop

Personally Identifiable Information or PII is leaking out of companies faster than ever. Equifax had two major hacks in a matter of months, Yahoo had three-billion emails stolen and so on. We could devote this entire post to various hacks...

Intermedia Anti-Phishing Tools for Small Business

Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor...

The Long Tail of Cybersecurity

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.The online world...

Tempered Networks Boosts Trust with Identity-Defined Networks

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with...

Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam...

Malicious Email of the Day

This is the best malicious e-mail I have seen in a while. It disguises itself with a From line: Microsoft OneDrive <noreply@icloud.com>. It looks legit until you realize iCloud competes with Microsoft and its Onedrive. Looking at it quickly -...

ITEXPO Attendee Cap'n Crunch Needs Your Help

I first met John Draper or Cap'n Crunch at ITEXPO in Los Angeles as he was looking to connect with Asterisk Creator and Digium founder Mark Spencer. I still remember how mystified people at the conference were when they learned...

Methbot: These ARE the Russian Cybercriminals We're Looking For

We have heard that Russian hacking caused Hillary Clinton the election for the last few weeks. But some surmise that pushing this narrative was done expressly to sway electors. Now that the vote is behind us - perhaps the Russian...

Ransomware Fog Rolls over SanFran Muni, SFMTA

We’ve known ransomware costs for a small- to medium-sized business can be $99,000, per Kapersky Labs. This includes lost business data, productivity and perhaps trade secrets or proprietary information, as well as increased spending on IT security. A new...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal...

You need a Flip Phone for Your Data Center

The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason? They are...

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...

9 Shocking Facts about the Nasdaq Breach by Russia

In October 2010, the FBI determined malware, most likely from an intelligence agency of another country had snuck into the Nasdaq’s central servers. The following facts are the most shocking: Several different groups were operating freely on Nasdaq computers, some...
1 2 3 Next
Featured Events