Author: Bert Rankin

Cybercriminals are motivated by several things, including fun, fame, ideology, revenge, and especially monetary gain. They use many techniques in their quest to achieve these goals, and keylogging malware (aka keyloggers), and other password snatching techniques are among their primary tools. Understanding the Why of Malware...

Polymorphic malware has been around since the early 1990s, but it’s still wreaking havoc in our computers and networks. SC Magazine recently reported on a particularly nasty strain of polymorphic malware that, according to the article, “is able to evade over 75 percent of antivirus...

From Bad Rabbit to NotPetya, bad actors are constantly evolving their malware attack vectors–the methods they use to distribute sophisticated malware attacks. This ever-growing network threat landscape requires organizations to keep abreast of changes in the way in which malware is delivered. Keeping Pace with New...

Over the last few years, we’ve seen a number of families of malware written specifically for the Mac OS X operating system. There was Flashback, and more recently the KeRanger ransomware. We’ve also seen more targeted attacks where Mac OS X malware was written to...

A “watering hole attack” is one of many techniques used by cybercriminals to breach an organization’s online information system. Network security administrators should understand how watering hole attacks work, and how to guard against them. Watering hole attacks are neither new or common, but they continually...