Sat.Jan 09, 2016 - Fri.Jan 15, 2016

article thumbnail

How email in transit can be intercepted using dns hijacking

Elie

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack discussed in a previous post, it is equally effective at defeating email in-transit encryption.

DNS 48
article thumbnail

DD4BC Arrests: What Now for Extortion?

Digital Shadows

Earlier this week, Europol published a press release stating that an individual suspected of being a “key member” of the. The post DD4BC Arrests: What Now for Extortion? first appeared on Digital Shadows.

DDOS 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Complex Threat Landscape

Digital Shadows

Achieving a better understanding of the threat landscape is key for organizations; the better they know their enemies, the better. The post A Complex Threat Landscape first appeared on Digital Shadows.

article thumbnail

RATs: Invasion of Your Privacy

Digital Shadows

When most people hear the word “RAT” they envision a large rodent that dines in dumpsters while seeking solace in. The post RATs: Invasion of Your Privacy first appeared on Digital Shadows.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.