

Matt Aldridge
Principal Solutions Architect /*=$expert->feature_status*/ ?>
Webroot
Comments Dotted :
13
January 26, 2021
It is important to keep your credentials safe, use strong passwords, and be aware of phishing attacks trying to fool you into providing your details.
Remember that your online gaming accounts are a hot target for hackers for several reasons. Cybercriminals are able to extract funds that you may have paid in, or sell items you have purchased in your games, but they can also use your account for theft via a stored credit card and also for money laundering – purchasing in-game currency using one stolen account and then transferring it to another compromised account to try and cover their tracks from law enforcement. For these reasons, it is
.....Read More
October 01, 2020
It is important to have the proper policies, access controls, monitoring, and response plans in place.
As Shopify has now learned the hard way, insider threats are real, and it is crucial that all organisations assess and mitigate the risk of internal agents going ‘rogue’. In this case, it should not have been possible for these support agents to extract such large volumes of data from the Shopify platform. It is important to have the proper policies, access controls, monitoring, and response plans in place to prevent and mitigate against this type of threat. Also, investing properly in.....Read More

September 17, 2020
Educational institutions need to ensure they are not the low hanging fruit that makes easy pickings for cybercriminals.
It’s unsurprising that education institutions continue to be targets for cybercriminals, especially considering they can be large sprawling organisations that are hard to administer and secure. Balancing resources between their mission of educating their students and the need for cybersecurity is an ongoing challenge. For cybercriminals, now is the perfect time to cause disruption as students start the term. In order to limit the impact of these attacks, the NCSC has done the right thing by .....Read More

September 04, 2020
This raises the question of whether platforms are doing enough to keep our information safe.
With the increased use of social tools for business communications, social media security is more important than ever. While the benefits of social are clear, there are risks to be wary of. Once hackers gain access to social media accounts, they can cause enormous brand reputation damage.
Unfortunately, in this case, the apparent hack followed a larger hack in July, where attackers breached privileged ‘God Mode’ accounts and compromised the accounts of prominent people including Barack.....Read More

September 04, 2020
This raises the question of whether platforms are doing enough to keep our information safe.
With the increased use of social tools for business communications, social media security is more important than ever. While the benefits of social are clear, there are risks to be wary of. Once hackers gain access to social media accounts, they can cause enormous brand reputation damage.
Unfortunately, in this case, the apparent hack followed a larger hack in July, where attackers breached privileged ‘God Mode’ accounts and compromised the accounts of prominent people including Barack.....Read More

August 27, 2020
it’s likely attackers facilitated the DDoS style attack through the use of botnets.
This latest attack again highlights the risks posed by threat actors, who can use cyberattacks to try to cripple important financial infrastructure at a national scale. In this case, it’s likely attackers facilitated the DDoS style attack through the use of botnets. The evolution of attack types emitting from botnets has been rapid over recent years and is unlikely to slow down.
Financial services platforms are often robustly protected with an array of products and services attempting to.....Read More

August 27, 2020
it’s likely attackers facilitated the DDoS style attack through the use of botnets.
This latest attack again highlights the risks posed by threat actors, who can use cyberattacks to try to cripple important financial infrastructure at a national scale. In this case, it’s likely attackers facilitated the DDoS style attack through the use of botnets. The evolution of attack types emitting from botnets has been rapid over recent years and is unlikely to slow down.
Financial services platforms are often robustly protected with an array of products and services attempting to.....Read More

August 17, 2020
The growing demand for these devices requires that manufacturers focus on their security and privacy.
Security in IoT devices such as the Amazon Echo and associated Alexa voice assistant service is an important issue. These devices often have security constraints in terms of their size, cost, limited user interfaces or “always-on” functionality – making them a really attractive target for hackers.
Consumers purchasing many of these IoT devices for convenience or novelty are unlikely to be aware of basic security measures and how much of their private data is been consumed by the devices. .....Read More

July 24, 2020
Sports companies need to ensure their defenses are watertight both on and off the field of play.
This hack highlights how cybercriminals are increasingly targeting high profile industries with email scams. In this case, it seems a legitimate corporate email account has been broken into and the hacker has impersonated the real owner and attempted to defraud a club or agent into sending money to the attacker.
These email scams are becoming increasingly more sophisticated. We’ve witnessed new advanced variants even implementing features such as voice fraud, whereby an accurate deepfake.....Read More

June 22, 2020
The practice of stealing intellectual property in this way has been going on for a very long time.
The practice of stealing intellectual property in this way has been going on for a very long time. And this highly targeted phishing technique or ‘spear phishing’ is presenting itself as a huge risk to governments and companies across the board. Cybercriminals utilise information from social media profiles, even using advanced technology such as AI to improve the scale and fidelity of threats. This enables them to fine tune phishing emails to look more and more like the real thing, creating .....Read More
