Categories
Application Security IT Security Outsourced IT

Phantom Hacker Scams

What are Phantom Hacker Scams? The FBI has alerted the public to a recent nationwide increase in Phantom Hacker scams, which primarily impact senior citizens.1 Phantom Hacker scams have evolved from more general tech support scams. They operate by layering imposter tech support, government, and financial institution personas in a complex ruse to build trust […]

Categories
Application Security Government IT Security Outsourced IT

Web Application Access Control Threats

What are Web Application Access Control Threats? The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and U.S. National Security Agency (NSA) have released a Cybersecurity Advisory to warn vendors, designers, and developers of web applications, and organizations using web applications, about insecure direct object reference (IDOR) vulnerabilities.1 […]

Categories
Application Security IT Security Outsourced IT

Object Linking and Embedding Malware

What is Object Linking and Embedding Malware? Object Linking and Embedding (OLE) allows users to create and edit documents that contain objects created by different applications. OLE technology gives users the ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe Acrobat, AutoCAD, and multimedia […]

Categories
Application Security IT Security Outsourced IT

Email Protocols

What are Email Protocols? An email protocol is a group of rules and regulations that ensure that email messages are properly created, transmitted, and received between different servers, machines, and email clients. Email protocols create standards that messages should follow to reach the recipients in their original state. The following are the three standard email […]

Categories
Application Security IT Security Outsourced IT

Stack Smashing Attacks

What is a Stack Smashing Attack? Stack smashing is a form of vulnerability where the stack of a computer application or OS is forced to overflow. This may lead to subverting the program/system and crashing it. A stack, a first-in last-out (FILO) circuit, is a form of buffer holding intermediate results of operations within it. […]

Categories
Application Security IT Security Outsourced IT

Whitelisting

What is Whitelisting? Whitelisting is a cybersecurity strategy that approves lists of email addresses, IP addresses, applications, and/or domain names, while denying all others, by default. With whitelisting, a user can only take actions on their computer that an administrator has explicitly allowed in advance, because they have deemed those actions to be safe and […]

Categories
Application Security IT Security Outsourced IT

File Sharing Best Practices

What are File-Sharing Best Practices? File sharing is a common, yet dangerous, daily business activity. Take time to evaluate your file sharing methods to ensure that you are choosing the most secure procedures. Consider the following best practices as you decide how you will send and receive files securely: Multi-factor authentication. Use multi-factor authentication (MFA) […]

Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]

Categories
Application Security IT Security Outsourced IT

Antivirus Protection

What is Antivirus Protection? Antivirus software protects devices against viruses and malware through a combination of prevention, detection, and removal. Antivirus software can be installed on computers and other devices, such as smartphones and tablets. The two major types of antivirus protection are1: Traditional antivirus protection. Traditional antivirus software relies heavily upon the signature, or […]

Categories
Application Security IT Security Outsourced IT

Application Lifecycle Management

What is Application Lifecycle Management? Application lifecycle management (ALM) refers to the creation and maintenance of a software application, encompassing the people, tools, and processes that manage the life cycle of an application from its conception to the end of its life. ALM is also known as integrated application lifecycle management, as it involves an […]