Watering Holes Attacks on the Rise

In case you haven’t heard, a new attack vector is a “watering hole” attack. In the real world, you might think of a watering hole attack as one in which a lion waits nearby for other animals to visit a pond for a drink. As a technical attack, it’s not much different. The attacker sets traps on sites that are frequented by individuals/organizations. Once the victim visits the site, the attack is launched.

Read more

Smartphone Security Tips

Tablets and smart phones exploded into the workspace in 2012, and that trend is expected to continue. The ease of use and size make these smaller devices the preferred technology for many people. Unfortunately, approximately $7 million worth of smart phones go missing globally each day, according to Verizon. When these devices are misplaced, they become a security risk.

Read more