Automating Banking Fraud: How It Works

By | April 22nd, 2013
Industry InSights, Network Security & Solutions|Comments Off on Automating Banking Fraud: How It Works

Mobile Phishing

Mobile Phishing By: Pierluigi Paganini Emails are considerable as a primary vector for cyber-attacks against mobile devices, principal security firms revealed that phishing activities in the last few years have increased exponentially, targeting every sector from industry to government agencies. RSA’s October Online Fraud Report 2012 described an impressive increase in phishing attacks, up 19% over the second half of 2011. The total loss for various organizations sums up to $2.1 billion over the last 18 months; [...]

By | April 2nd, 2013
Network Security & Solutions|Comments Off on Mobile Phishing

Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Are Your Smartphone Apps Leaking Personal Information? For many years now, we have been trained to look for the SSL icon on our browsers, and have told our family and friends to do the same. It’s a basic security measure that ensures our traffic cannot be intercepted and spied on. The last thing we want when doing online banking, reading our email or shopping online is having someone sitting there and watching our every move, [...]

By | March 13th, 2013
Industry InSights, IT Infrastructure|Comments Off on Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Ten Tips to Stay Safe on Cyber Monday

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. For employees who spend time making purchases either at lunch, break time, or at the end of the work day, here are some tips to stay safe on the largest online activity day of the year. [1] Make sure your desktop computer, laptop, smartphone, or mobile [...]

By | November 22nd, 2011
Industry InSights, Network Security & Solutions, Security Awareness|Comments Off on Ten Tips to Stay Safe on Cyber Monday

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

Mobile Menace: Trends in Mobile Threats Infographic

By | August 11th, 2011
IT Infrastructure|Comments Off on Mobile Menace: Trends in Mobile Threats Infographic

6 Sure-Fire Ways to Increase Mobile Security

6 Sure-fire Ways to Increase Mobile Security Mobile threats have risen by more than eight times over the past five years, with a sharp increase in 2010. After some 200,000 users downloaded infected mobile apps from the official app store Android Market, Google pulled more than 50 infected programs from the Market. In an effort to protect information on mobile devices, IT managers are increasingly becoming aware of the need to not only apply security [...]

By | March 26th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on 6 Sure-Fire Ways to Increase Mobile Security

Top Tech Threats & Trends for 2011

Twitter |  Facebook |  LinkedIn Top Tech Threats & Trends for 2011 Here at InfoSight, Inc. we have put together our take on what the key tech trends and threats of 2011 will be. We know as the technologies become faster and smarter so will the threats that follow them. The Social Engineering and Black Hat SEO we experienced in the previous year will still hold strong and continue to transform, and we’ll see a [...]

By | March 26th, 2011
IT Infrastructure|Comments Off on Top Tech Threats & Trends for 2011