Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]

Categories
Application Security IT Security Outsourced IT Websites

Formjacking

What is Formjacking? Formjacking is a type of cyberattack that steals credit card details by inserting malicious JavaScript code into online payment forms. This malicious code operates covertly in the background on payment form web pages that are often served to the victim from a third-party payment processing company, but can also be found in: […]

Categories
Application Security IT Security Outsourced IT

Cybersecurity for Operational Technology

What is Cybersecurity for Operational Technology? Operational technology (OT) encompasses a broad range of programmable systems or devices that interact with physical environment (or manage devices that interact with the physical environment.)1 These systems and devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples of OT […]

Categories
Application Security IT Security Outsourced IT

InfoSec

What is InfoSec? Information security, aka InfoSec, refers to the processes and tools that are designed and deployed to protect sensitive business information from unauthorized modification, disruption, destruction, and inspection1. InfoSec encompasses physical and environmental security, access control, and cybersecurity, and often includes technologies such as cloud access security brokers (CASB), deception tools, endpoint detection […]

Categories
Application Security IT Security

iPhone Calendar Viruses

What are iPhone Calendar Viruses? Over the last few years, cyberattackers have been increasingly targeting the iPhone calendar app in an attack known as “calendar spam.” In these attacks, iPhone users have reported that their calendars have been filling up with strange appointments, reminders, and other junk events that are often pornographic or contain warnings […]

Categories
Application Security IT Security Outsourced IT

Remote Desktop Protocol

What is Remote Desktop Protocol? The Remote Desktop Protocol (RDP) is a technical standard for using a desktop computer remotely. Remote desktop software can use several different protocols including Independent Computing Architecture (ICA), Virtual Network Computing (VNC), and RDP. RDP, the most commonly used protocol, was initially released by Microsoft and is available for most […]

Categories
Application Security IT Security

PUPs

What are PUPs? Potentially unwanted programs (PUPs) are software programs that are often installed when other software is being installed on a computer. PUPs often serve as marketing tools and may modify browser settings to display advertisements; this form of PUP is referred to as adware. PUPs differ from other malicious programs such as worms […]

Categories
Application Security

QR Code Security

What is QR Code Security? A quick response (QR) code is a type of barcode that stores information as a series of pixels in a borderless square-shaped grid to be read by a digital device. When a QR code graphic is positioned in front of the lens of a smartphone camera, the code is read […]

Categories
Application Security IT Security

Productivity Tools and Cybersecurity

What are Productivity Tools? With so many productivity tools and applications available, employees are often keenly aware of alternative strategies for collaborating and getting work done. If employees feel that their cybersecurity practices and policies are creating obstacles and slowing them down, they are likely to look for ways around that by accessing other tools […]

Categories
Application Security IT Security Outsourced IT

Cross-Site Request Forgery

What is Cross-Site Request Forgery? Cross-site request forgery (CSRF) cyberattacks are common web application vulnerabilities that take advantage of the trust that a website has already granted a user and their browser by tricking the web browser into executing an unwanted action in an application that the user is already logged in to. CSRF cyberattacks […]