Top 10 Cyber Security Tools for Small Businesses

Small businesses have few options for cyber security tools and even fewer resources to deploy and manage them. You must choose wisely to carefully balance low cost, ease of use, and high impact on the security posture of the organization. So what security tools should small businesses focus on? A SANS research paper has 10 suggestions for SMB security tools. The…

4 Types of Social Engineering Used Every Day

Persuasion is part of life. We all try to persuade friends and loved ones to act in a certain way, usually with the best of intentions. Social engineering is when “persuasion” takes a darker turn. In a broad sense, it includes any action that attempts to influence a person to act against their best interests. Technically, acts that influence people…

Chinese Hackers Spread Android Banking Trojan Using Fake Cellphone Tower

According to a Check Point Software blog, Chinese hackers using a rogue cell phone tower, have taken smishing to the next level. The hackers ar distributing Android banking malware via spoofed SMS messages from these rogue cell towers. Security researchers at Check Point discovered that Chinese hackers are using fake base transceiver stations (BTS towers) to distribute "Swearing Trojan," an Android…