Author: Bert Rankin

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

Identity theft continues to be a challenging and expensive risk for consumers, and malware that’s specifically designed to steal users’ account data and identities are often used to commit the crime. The reason for this persistent threat? Simple, identity theft is a very lucrative business for cybercriminals. The...

With no remedy in sight to the cybersecurity talent shortage, organizations must be creative, determined, and mobilized. Rather than focusing on what the organization doesn't have, cybersecurity professionals must instead get optimal performance from the resources they have ready and available. Through advanced cybersecurity technologies,...

Cybercriminals are motivated by several things, including fun, fame, ideology, revenge, and especially monetary gain. They use many techniques in their quest to achieve these goals, and keylogging malware (aka keyloggers), and other password snatching techniques are among their primary tools. Understanding the Why of Malware...

Polymorphic malware has been around since the early 1990s, but it’s still wreaking havoc in our computers and networks. SC Magazine recently reported on a particularly nasty strain of polymorphic malware that, according to the article, “is able to evade over 75 percent of antivirus...